CN113691370A - Method and device for quantum secure communication - Google Patents

Method and device for quantum secure communication Download PDF

Info

Publication number
CN113691370A
CN113691370A CN202110849002.8A CN202110849002A CN113691370A CN 113691370 A CN113691370 A CN 113691370A CN 202110849002 A CN202110849002 A CN 202110849002A CN 113691370 A CN113691370 A CN 113691370A
Authority
CN
China
Prior art keywords
key
modulation
ciphertext
quantum
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110849002.8A
Other languages
Chinese (zh)
Other versions
CN113691370B (en
Inventor
赖俊森
吴冰冰
刘璐
汤瑞
赵鑫
汤晓华
赵文玉
张海懿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202110849002.8A priority Critical patent/CN113691370B/en
Publication of CN113691370A publication Critical patent/CN113691370A/en
Application granted granted Critical
Publication of CN113691370B publication Critical patent/CN113691370B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The application relates to the technical field of quantum communication, and discloses a method for quantum secret communication, which is applied to a quantum secret communication sending end and comprises the following steps: generating an initial key by using Quantum Key Distribution (QKD); expanding the initial key to obtain a data key and a modulation key; encrypting the plaintext electric signal by using the data key to obtain a ciphertext electric signal; generating a modulation control signal using the modulation key; and electro-optically modulating the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to a quantum secret communication receiving end. The data layer encryption is realized by encrypting the plaintext electric signals through the data key to obtain ciphertext electric signals, the physical layer encryption is realized by electro-optically modulating the ciphertext electric signals through the modulation control signals generated by the modulation key, and the security of quantum secret communication is improved due to the adoption of double encryption of the physical layer and the data layer. The application also discloses an apparatus for quantum secure communication.

Description

Method and device for quantum secure communication
Technical Field
The present application relates to the field of quantum communication technology, and for example, to a method and an apparatus for quantum secure communication.
Background
At present, quantum communication is in a rapid development stage, a new technology emerges endlessly, and with continuous progress of quantum communication hardware, software and a matching platform, the attraction of quantum communication to the industry is improved. In order to improve the security and confidentiality of quantum communication, encrypting a plaintext electric signal in the quantum communication process is an indispensable link. The QKD (Quantum key Distribution) technology can provide Quantum key generation and sharing of information theory safety of a theoretical protocol level for a transmitting end and a receiving end, a typical QKD system comprises discrete variables based on a Quantum key Distribution protocol BB84 and continuous variables based on a coherent state continuous variable Quantum key Distribution protocol GG02, and the discrete variables and the continuous variables are respectively suitable for different application scenarios. After obtaining the quantum key shared by the transmitting end and the receiving end, the existing quantum secure communication system generally adopts an encryption virtual private network device or an encryption router based on an IPSec (Internet Protocol Security) Protocol as an encryption application device to encrypt a data layer of a plaintext electrical signal, and then transmits a ciphertext signal.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art: in the prior art, the plaintext electric signal is directly transmitted only by single encryption, so that the security of quantum communication transmission is low.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of such embodiments but rather as a prelude to the more detailed description that is presented later.
The embodiment of the disclosure provides a method and a device for quantum secure communication, so as to improve the security of quantum secure communication transmission.
In some embodiments, the method for quantum secure communication is applied to a quantum secure communication sending end, and the method includes: generating an initial key by using Quantum Key Distribution (QKD); expanding the initial key to obtain a data key and a modulation key; encrypting the plaintext electric signal by using the data key to obtain a ciphertext electric signal; generating a modulation control signal using the modulation key; and electro-optically modulating the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to a quantum secret communication receiving end.
In some embodiments, the method for quantum secure communication is applied to a quantum secure communication receiving end, and the method includes: generating an initial key by using Quantum Key Distribution (QKD); expanding the initial key to obtain a data key and a modulation key; generating a demodulation control signal by using the modulation key; demodulating the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; and decrypting the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
In some embodiments, the apparatus for quantum secure communication is applied to a quantum secure communication sending end, and the apparatus includes: a quantum key distribution sending module configured to generate an initial key using Quantum Key Distribution (QKD); a sender key expansion module configured to expand the initial key to obtain a data key and a modulation key; the data encryption module is configured to encrypt a plaintext electric signal by using the data key to obtain a ciphertext electric signal; a randomized modulation spreading module configured to generate a modulation control signal using the modulation key; and the electro-optical modulation module is configured to perform electro-optical modulation on the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and send the ciphertext optical signal to a quantum secret communication receiving end.
In some embodiments, the apparatus for quantum secure communication is applied to a quantum secure communication receiving end, and the apparatus includes: a quantum key distribution receiving module configured to generate an initial key using quantum key distribution QKD; a receiver key expansion module configured to expand the initial key to obtain a data key and a modulation key; a randomized demodulation adaptation module configured to generate a demodulation control signal using the modulation key; the photoelectric detection demodulation module is configured to demodulate the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; and the data decryption module is configured to decrypt the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
The method and the device for quantum secret communication provided by the embodiment of the disclosure can realize the following technical effects: the method comprises the steps of generating an initial key through Quantum Key Distribution (QKD), expanding the initial key to obtain a data key and a modulation key, encrypting a plaintext electric signal by using the data key to obtain a ciphertext electric signal to realize data layer encryption, generating a modulation control signal by using the modulation key, and electro-optically modulating the ciphertext electric signal by using a modulation signal to realize physical layer encryption. Therefore, when the ciphertext optical signal is obtained, the ciphertext electric signal can be encrypted for the second time in the process of converting the ciphertext electric signal into the optical signal, and then the ciphertext optical signal is sent to the quantum secret communication receiving end.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the accompanying drawings and not in limitation thereof, in which elements having the same reference numeral designations are shown as like elements and not in limitation thereof, and wherein:
FIG. 1 is a schematic diagram of a method for quantum secure communication provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of another method for quantum secure communication provided by embodiments of the present disclosure;
FIG. 3 is a timing diagram of another method for quantum secure communication provided by embodiments of the present disclosure;
FIG. 4 is a schematic diagram of an apparatus for quantum secure communication provided by embodiments of the present disclosure;
fig. 5 is a schematic diagram of a system for quantum secure communication according to an embodiment of the present disclosure.
Detailed Description
So that the manner in which the features and elements of the disclosed embodiments can be understood in detail, a more particular description of the disclosed embodiments, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
The terms "first," "second," and the like in the description and in the claims, and the above-described drawings of embodiments of the present disclosure, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the present disclosure described herein may be made. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The term "plurality" means two or more unless otherwise specified.
In the embodiment of the present disclosure, the character "/" indicates that the preceding and following objects are in an or relationship. For example, A/B represents: a or B.
The term "and/or" is an associative relationship that describes objects, meaning that three relationships may exist. For example, a and/or B, represents: a or B, or A and B.
The term "correspond" may refer to an association or binding relationship, and a corresponds to B refers to an association or binding relationship between a and B.
With reference to fig. 1, an embodiment of the present disclosure provides a method for quantum secure communication, which is applied to a quantum secure communication sending end, and the method includes:
and step S101, the quantum secret communication sending end generates an initial key by using Quantum Key Distribution (QKD).
And S102, the quantum secret communication sending end expands the initial key to obtain a data key and a modulation key.
And step S103, the quantum secret communication sending end encrypts the plaintext electric signal by using the data key to obtain a ciphertext electric signal.
And step S104, the quantum secret communication sending end generates a modulation control signal by using the modulation key.
And S105, electro-optically modulating the ciphertext electric signal by the quantum secret communication sending end by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to the quantum secret communication receiving end.
By adopting the method for quantum secret communication provided by the embodiment of the disclosure, an initial key can be generated by quantum key distribution QKD, the initial key is expanded to obtain a data key and a modulation key, then a plaintext electric signal is encrypted by the data key to obtain a ciphertext electric signal to realize data layer encryption, a modulation control signal is generated by the modulation key, and the ciphertext electric signal is electro-optically modulated by the modulation signal to realize physical layer encryption. Therefore, when the ciphertext optical signal is obtained, the ciphertext electric signal can be encrypted for the second time in the process of converting the ciphertext electric signal into the optical signal, and then the ciphertext optical signal is sent to the quantum secret communication receiving end.
The quantum key distribution QKD can realize the quantum key distribution function of both a quantum secret communication sending end and a quantum secret communication receiving end based on the basic functions and methods of the quantum state optical signal transmission, the synchronous or local oscillator signal transmission, the negotiation signal transmission and the like, realize end-to-end key generation, provide an initial key for the quantum secret communication and store the initial key. Optionally, the generation rate of the initial key is greater than or equal to 10 kbit/s.
Optionally, the initial key is a random data stream. Therefore, the data key and the modulation key obtained by expanding the initial key are random data, the plaintext electric signal is encrypted by the data key of the random data to obtain the ciphertext electric signal, then the modulation control signal is generated by the modulation key of the random data, the ciphertext electric signal is subjected to electro-optical modulation by the modulation control signal to obtain the ciphertext optical signal, the randomness of the ciphertext optical signal is increased, and the safety and the confidentiality of quantum secret communication are improved.
Optionally, the modulation method of the electro-optical modulation includes: modulation methods such as Amplitude Modulation (AM), Phase Modulation (PM), and Quadrature Amplitude Modulation (QAM). Different modulation modes enable the distribution of the ciphertext optical signals in the dimensions of amplitude, phase or quadrature phase to be random distribution. Therefore, the secondary encryption of the ciphertext signal in the optical domain is realized, the ciphertext optical signal can be hidden in channel quantum noise, such as detector shot noise, the difficulty of eavesdropping and storing the ciphertext optical signal is increased, and the security and confidentiality of quantum secret communication are improved.
Optionally, the quantum secure communication sending end expands the initial key to obtain a data key and a modulation key, including: the quantum secret communication sending end intercepts two different groups from the initial key, and respectively expands the intercepted two groups to obtain a data key and a modulation key.
Optionally, intercepting two different packets from the initial key, and spreading the two intercepted packets respectively to obtain a data key and a modulation key, including: continuously intercepting two different groups from the initial key every preset time length to obtain a first group key and a second group key; expanding the first group key through a key expansion algorithm corresponding to the high three-bit data of the first group key to obtain a data key; and expanding the second grouping key by a key expansion algorithm corresponding to the high three-bit data of the second grouping key to obtain a modulation key. Optionally, the length of the first packet key is the same as the length of the second packet key. For example: are 256bits each. Optionally, the preset time duration is in the order of hundred milliseconds, that is, the rate of generating the first packet key and the second packet key is 10 times per second, so that the first packet key and the second packet key are updated. Under the condition that the length of the first grouping key and the length of the second grouping key are 256bits and the updating rate of the first grouping key and the second grouping key is 10 times per second, the requirements of key consistency and key randomness can be met, and the security of quantum secret communication is high.
Optionally, the key expansion algorithm includes a first feedback control function, and the key expansion algorithm corresponding to the upper three bits of data of the first group key expands the first group key to obtain the data key, including: acquiring high three-bit data of a first packet key; matching a first feedback control function corresponding to the upper three-bit data of the first packet key in a preset first algorithm lookup table; expanding the first packet key by using a first feedback control function to obtain a data key; the preset first algorithm lookup table stores the corresponding relation between the upper three-bit data of the first packet key and the first feedback control function.
Optionally, the key spreading algorithm includes a second feedback control function, and the spreading is performed on the second grouping key by using a key spreading algorithm corresponding to the upper three bits of the second grouping key to obtain the modulation key, where the spreading comprises: acquiring high three-bit data of a second grouping key; matching a second feedback control function corresponding to the high three-bit data of the second grouping key in a preset second algorithm lookup table; expanding the second grouping key by using a second feedback control function to obtain a modulation key; the preset second algorithm lookup table stores the corresponding relation between the upper three-bit data of the second grouping key and the second feedback control function.
Optionally, the first algorithm lookup table and the second algorithm lookup table are the same table, and the first algorithm lookup table and the second algorithm lookup table are stored in the linear feedback shift register. Optionally, 8 feedback control functions are stored in the linear feedback shift register.
Optionally, the key expansion algorithm is implemented by a linear feedback shift register. Therefore, the key expansion algorithm realized through the linear feedback shift register can respectively expand the first grouping key and the second grouping key, meanwhile, the output rates of the data key and the modulation key can be determined according to the speed of the plaintext electric signal, the output rates of the data key and the modulation key are improved, the output rates of the data key and the modulation key are enabled to be larger than or equal to the speed of the plaintext electric signal, the speed matching among the data key, the modulation key and the plaintext electric signal is realized, and the plaintext electric signal is conveniently encrypted through the data key and the modulation key.
Two different groups are continuously intercepted from the initial key every preset time length, namely, a new first group key and a new second group key are obtained every preset time length, the first feedback control function and the second feedback control function are respectively matched again through the upper three-bit data of the updated first group key and the second group key, and the updated first group key and the updated second group key are respectively expanded according to the new first feedback control function and the new second feedback control function, so that a new data key and a new modulation key are obtained. Therefore, the initial key is provided through the QKD, the initial key is intercepted every preset time length, a real-time initial key updating function is provided, the data key and the modulation key are updated according to the updated initial key, the reuse rate of the data key and the modulation key is reduced, the security of encrypting plaintext information can be improved, and the security of quantum secret communication is improved.
Optionally, the encrypting the plaintext electric signal by the quantum secure communication sending end using the data key includes: the quantum secret communication sending end carries out bit-by-bit exclusive-OR logic operation on the received plain-text electric signals by using the data key. Because the data key is matched with the speed of the plaintext electric signal, the data key can be used for carrying out bit-by-bit XOR logic operation on the received plaintext electric signal, the initial key is updated and expanded in real time, the expanded data key is used for carrying out bit-by-bit XOR encryption on the plaintext electric signal to obtain the ciphertext electric signal, the encryption of a plaintext electric signal data layer is realized, the polarity scrambling on the plaintext signal is completed, the modulation key is convenient to carry out electro-optical modulation on the ciphertext electric signal, and the safety and the confidentiality of quantum secret communication are further improved.
Optionally, the quantum secure communication sending end generates the modulation control signal by using the modulation key, including: a quantum secret communication sending end generates a modulation basis vector combination of a half-amplitude modulation domain; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key to obtain the modulation control signal.
Optionally, generating a modulation basis vector combination of the half-amplitude modulation domain includes: acquiring a preset modulation domain; and dividing the modulation domain into M groups of modulation basis vector combinations of the half-amplitude modulation domain. Alternatively, 12 ≦ M ≦ 16. In some embodiments, M-12, the number of combinations of spreading values of the corresponding modulation domain is 2124096. The larger M is, the more modulation basis vector combinations are, the larger the number of combinations of spreading values of the corresponding modulation domains is, and the more ciphertext optical signals can be hidden in sub-noise such as thermal noise and shot noise of the system. For example, M is 12, 13, 14, 15 or 16, so that the effect of electro-optical modulation can be ensured without being limited by hardware circuits.
Optionally, the grouping of the plurality of modulation keys is obtained by segmenting the modulation key. Optionally, the length of the packet of the modulation key is M.
Optionally, selecting a polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the packet of the modulation key to obtain the modulation control signal includes: determining a corresponding first mapping signal according to a modulation mode of electro-optical modulation; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key, and obtaining the modulation control signal according to the first mapping signal and the polarity of each modulation basis vector in the modulation basis vector combination. The modulation bias point and the modulation amplitude can be set through the modulation key, so that while the modulation control signal is obtained, the polarity of the modulation basis vector can be calibrated by configuring the quantum secret communication sending end and the quantum secret communication receiving end according to the high bit of the group of the modulation key, only the quantum secret communication receiving end can correctly judge the received ciphertext optical signal, and the safety of quantum secret communication is improved.
Optionally, when the modulation mode of the electro-optical modulation is intensity modulation, the first mapping signal is a bias voltage distribution signal; under the condition that the modulation mode of the electro-optical modulation is phase modulation, the first mapping signal is a phase modulation voltage amplitude signal; when the modulation method of the electro-optical modulation is quadrature amplitude modulation, the first mapping signal is a quadrature electric field signal distribution signal.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is reversed.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is reversed.
In this way, the polarity of each modulation basis vector in the modulation basis vector combination is controlled by the high bit controlled by the modulation key, the polarity of each modulation basis vector is randomly selected, and because each group of combinations still has 1/2 modulation domain amplitudes, the quantum secret communication receiving end is not affected by noise when performing reception judgment, the difference between the modulation domain amplitudes of adjacent combinations is small, and in the case of no modulation key, the ciphertext optical signal is hidden in the sub-noise such as the thermal noise and the shot-bounce noise of the system, so the quantum secret communication receiving end cannot perform correct reception judgment. Meanwhile, the modulation key is matched with the speed of the plaintext electric signal and is random data, so that the modulation key can be used for randomly selecting the polarity of each modulation basis vector in the modulation basis vector combination, the ciphertext electric signal can be subjected to electro-optical modulation, a modulated ciphertext optical signal with a randomized modulation domain expansion is obtained, the physical layer encryption of the ciphertext electric signal is realized, and the security of quantum secret communication is improved.
With reference to fig. 2, another method for quantum secure communication is provided in an embodiment of the present disclosure, where the method is applied to a quantum secure communication receiving end, and the method includes:
step S201, the quantum secret communication receiving end generates an initial key by using quantum key distribution QKD.
Step S202, the quantum secret communication receiving end expands the initial key to obtain a data key and a modulation key.
In step S203, the quantum secure communication receiving end generates a demodulation control signal by using the modulation key.
And step S204, the quantum secret communication receiving end demodulates the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal.
In step S205, the quantum secure communication receiving end decrypts the ciphertext electrical signal by using the data key to obtain a plaintext electrical signal.
By adopting the method for quantum secure communication provided by the embodiment of the disclosure, an initial key can be generated by quantum key distribution QKD, the initial key is expanded to obtain a data key and a modulation key, then a demodulation control signal is generated by using the modulation key, a detected ciphertext optical signal is demodulated by using the demodulation control signal to obtain a ciphertext electric signal to realize decryption of a physical layer, the ciphertext electric signal is decrypted by using the data key to obtain a plaintext electric signal to realize decryption of a data layer, and thus the plaintext electric signal is recovered. Because the quantum secret communication receiving end decrypts the ciphertext optical signal twice to obtain the plaintext electric signal, the safety of the quantum secret communication is improved.
The quantum key distribution QKD can realize the quantum key distribution function of both a quantum secret communication sending end and a quantum secret communication receiving end based on the basic functions and methods of the quantum state optical signal transmission, the synchronous or local oscillator signal transmission, the negotiation signal transmission and the like, realize end-to-end key generation, provide an initial key for the quantum secret communication and store the initial key. Optionally, the generation rate of the initial key is greater than or equal to 10 kbit/s.
Optionally, the initial key is a random data stream. Thus, the data key and the modulation key obtained by spreading the initial key are both random data.
Optionally, the initial key of the quantum secure communication receiving end is the same as the initial key of the quantum secure communication transmitting end. Thus, the same data key and the same modulation key can be generated according to the same initial key, so that a plaintext electric signal can be recovered by receiving and decrypting the received ciphertext optical signal.
Optionally, the demodulation method of the electro-optical demodulation corresponds to the modulation method of the electro-optical modulation of the quantum secret communication sending end.
Optionally, the quantum secure communication receiving end expands the initial key to obtain a data key and a modulation key, including: the quantum secret communication receiving end intercepts two different groups from the initial key, and respectively expands the intercepted two groups to obtain a data key and a modulation key.
The method for intercepting the initial key at the receiving end of the quantum secret communication is the same as the method for intercepting the initial key at the sending end of the quantum secret communication, and is not described herein again. That is, the first packet key and the second packet key intercepted at the quantum secure communication receiving end for the initial key are the same as the first packet key and the second packet key intercepted at the quantum secure communication transmitting end for the initial key, respectively. Then, the data key obtained by the quantum secret communication receiving end expanding the initial key is the same as the data key obtained by the quantum secret communication sending end expanding the initial key. The modulation key obtained by the quantum secret communication receiving end expanding the initial key is the same as the modulation key obtained by the quantum secret communication sending end expanding the initial key.
Optionally, the quantum secure communication receiving end generates the demodulation control signal by using the modulation key, including: a quantum secret communication receiving end generates a modulation basis vector combination of a half-amplitude modulation domain; and the quantum secret communication receiving end selects the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key to obtain a demodulation control signal.
Optionally, generating a modulation basis vector combination of the half-amplitude modulation domain includes: acquiring a preset modulation domain; and dividing the modulation domain into M groups of modulation basis vector combinations of the half-amplitude modulation domain. Alternatively, 12 ≦ M ≦ 16. In some embodiments, M-12, the number of combinations of spreading values of the corresponding modulation domain is 2124096.
Optionally, the grouping of the plurality of modulation keys is obtained by segmenting the modulation key. Optionally, the length of the packet of the modulation key is M.
Optionally, selecting a polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the packet of the modulation key to obtain the demodulation control signal, including: selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key; determining a corresponding second mapping signal according to the modulation mode of the electro-optical modulation; and obtaining the demodulation control signal according to the polarity of each modulation basis vector in the modulation basis vector combination and the second mapping signal.
Optionally, when the modulation mode of the electro-optical modulation is intensity modulation, the second mapping signal is a detection decision voltage signal; when the modulation mode of the electro-optical modulation is phase modulation, the second mapping signal is a phase interference control voltage signal; and when the modulation mode of the electro-optical modulation is quadrature amplitude modulation, the first mapping signal is a quadrature electric field signal decision combination signal.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is reversed.
Optionally, the polarity of each modulation basis vector in the modulation basis vector combination is selected according to the following manner: in the case where the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is reversed.
Alternatively, the method for selecting the polarity of each modulation basis vector in the modulation basis vector combination used in the quantum secret communication receiving end is the same as the method for selecting the polarity of each modulation basis vector in the modulation basis vector combination used in the quantum secret communication transmitting end.
Therefore, the same modulation basis vector combination is generated through the same modulation signals of the quantum secret communication receiving end and the quantum secret communication sending end, the ciphertext optical signal after detection and demodulation can be judged and recovered, the ciphertext electric signal the same as the quantum secret communication receiving end is obtained, the physical layer decryption of the ciphertext optical signal is realized, and the second decryption of the ciphertext electric signal by using the data key is facilitated. Because the quantum secret communication receiving end decrypts the ciphertext optical signal twice to obtain the plaintext electric signal, the security of the quantum secret communication is improved.
Optionally, the decrypting the ciphertext electric signal by the quantum secure communication receiving end using the data key includes: and the quantum secret communication receiving end performs bit-by-bit exclusive OR logic operation on the ciphertext electric signal by using the data key. The cipher text electric signal and the data key are subjected to bit-by-bit XOR logic operation at the quantum secret communication receiving end, the cipher text electric signal can be recovered to be a plaintext electric signal, second decryption is achieved, the quantum secret communication receiving end decrypts the cipher text optical signal twice to obtain the plaintext electric signal, and safety of quantum secret communication is improved.
In some embodiments, as shown in fig. 3, a method for quantum secure communication according to an embodiment of the present disclosure includes:
and S301, the quantum secret communication sending end generates an initial key by using Quantum Key Distribution (QKD).
And S302, the quantum secret communication receiving end generates an initial key by using the quantum key distribution QKD.
S303, the quantum secret communication sending end expands the initial key to obtain a data key and a modulation key;
s304, the quantum secret communication receiving end expands the initial key to obtain a data key and a modulation key.
S305, the quantum secret communication sending end uses the data key to carry out bit-by-bit logic operation on the plaintext electric signal to obtain the ciphertext electric signal.
S306, the quantum secret communication sending end uses the modulation key to generate a modulation control signal, and the ciphertext electric signal is modulated to obtain a ciphertext optical signal.
S307, the quantum secret communication sending end sends the ciphertext optical signal to the quantum secret communication receiving end.
S308, receiving the ciphertext optical signal by the quantum secret communication receiving end; and generating a demodulation control signal by using the modulation key, demodulating the ciphertext optical signal and recovering the ciphertext electric signal.
S309, the quantum secret communication receiving end carries out bit-by-bit logic operation on the ciphertext electric signal by using the data key, and recovers the plaintext electric signal.
With reference to fig. 4, an embodiment of the present disclosure provides an apparatus for quantum secure communication, which is applied to a quantum secure communication transmitting end, and the apparatus includes: the system comprises a quantum key distribution and transmission module 1, a sender key expansion module 2, a data encryption module 3, a randomized modulation expansion module 4 and an electro-optical modulation module 5. The quantum key distribution transmission module 1 is configured to generate an initial key using quantum key distribution QKD; the sender key expansion module 2 is configured to expand the initial key to obtain a data key and a modulation key; the data encryption module 3 is configured to encrypt the plaintext electric signal by using a data key to obtain a ciphertext electric signal; the randomized modulation spreading module 4 is configured to generate a modulation control signal using a modulation key; the electro-optical modulation module 5 is configured to perform electro-optical modulation on the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and send the ciphertext optical signal to the quantum secret communication receiving end.
The device for quantum secret communication provided by the embodiment of the disclosure is beneficial to generating an initial key through Quantum Key Distribution (QKD), expanding the initial key to obtain a data key and a modulation key, encrypting a plaintext electric signal by using the data key to obtain a ciphertext electric signal to realize data layer encryption, generating a modulation control signal by using the modulation key, and electro-optically modulating the ciphertext electric signal by using a modulation signal to realize physical layer encryption. Therefore, when the ciphertext optical signal is obtained, the ciphertext electric signal can be encrypted for the second time in the process of converting the ciphertext electric signal into the optical signal, and then the ciphertext optical signal is sent to the quantum secret communication receiving end.
Optionally, the sender key spreading module is configured to spread the initial key to obtain the data key and the modulation key by: two different packets are intercepted from the initial key, and the intercepted two packets are respectively expanded to obtain a data key and a modulation key.
Optionally, the data encryption module is configured to encrypt the plaintext electrical signal with the data key by: and carrying out bit-by-bit exclusive-or logic operation on the plain-text electric signal by using the data key.
Optionally, the randomized modulation spreading module is configured to generate the modulation control signal using the modulation key by: generating a modulation basis vector combination of a half-amplitude modulation domain; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key to obtain the modulation control signal.
With reference to fig. 4, an embodiment of the present disclosure provides an apparatus for quantum secure communication, applied to a quantum secure communication receiving end, the apparatus including: the device comprises a quantum key distribution receiving module 6, a receiver key expansion module 7, a randomized demodulation adaptation module 8, a photoelectric detection demodulation module 9 and a data decryption module 10. The quantum key distribution receiving module 6 is configured to generate an initial key using quantum key distribution QKD; the receiver key expansion module 7 is configured to expand the initial key to obtain a data key and a modulation key; the randomized demodulation adaptation module 8 is configured to generate a demodulation control signal using the modulation key; the photoelectric detection demodulation module 9 is configured to demodulate the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal; the electro-optical modulation module 10 is configured to decrypt the ciphertext electrical signal with the data key to obtain a plaintext electrical signal.
By adopting the device for quantum secret communication provided by the embodiment of the disclosure, an initial key is generated by quantum key distribution QKD, the initial key is expanded to obtain a data key and a modulation key, then a demodulation control signal is generated by using the modulation key, a detected ciphertext optical signal is demodulated by using the demodulation control signal to obtain a ciphertext electric signal to realize decryption of a physical layer, the ciphertext electric signal is decrypted by using the data key to obtain a plaintext electric signal to realize decryption of a data layer, and thus the plaintext electric signal is recovered. Because the quantum secret communication receiving end decrypts the ciphertext optical signal twice to obtain the plaintext electric signal, the security of the quantum secret communication is improved.
Optionally, the receiver key spreading module is configured to spread the initial key to obtain the data key and the modulation key by: two different packets are intercepted from the initial key, and the intercepted two packets are respectively expanded to obtain a data key and a modulation key.
Optionally, the randomized demodulation adaptation module is configured to generate the demodulation control signal using the modulation key by: generating a modulation basis vector combination of a half-amplitude modulation domain; and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high bits of the grouping of the modulation key to obtain the demodulation control signal.
Optionally, the electro-optical modulation module is configured to decrypt the ciphertext electrical signal with the data key by: and carrying out bit-by-bit exclusive-or logic operation on the ciphertext electric signal by using the data key.
Optionally, the communication mode between the quantum secret communication sending end and the quantum secret communication receiving end is optical communication. The optical path for optical communication is indicated by a dotted line in fig. 4, and the implementation indicates the circuit.
With reference to fig. 5, an embodiment of the present disclosure provides a system for quantum secure communication, where the system includes a quantum secure communication transmitting end 11 and a quantum secure communication receiving end 12, where the quantum secure communication transmitting end 11 includes: a QKD transmitter 13, a first FPGA (Field Programmable Gate Array) control system 14, a data encoding encryptor 15 and a signal modulating encryptor 16. The quantum secure communication receiving end 12 includes: QKD receiver 17, second FPGA control system 18, signal demodulation detector 19, and data decoding decryptor 20. In fig. 5, the solid line indicates the circuit, and the broken line indicates the optical path.
The QKD system consisting of QKD transmitter 13 and QKD receiver 17 is configured to generate initial keys at a rate of 10kbit/s and group the initial keys to obtain a first group key and a second group key. The length of the first grouping key and the second grouping key is 256bits, the grouping frequency is 10 times per second, and the first grouping key and the second grouping key are updated.
The first FPGA control system 14 is configured to receive the first packet key and the second packet key; expanding the first grouping key and the second grouping key by utilizing a linear feedback shift register built in the first FPGA control system; a data key and a modulation key are obtained. The first grouping key and the second grouping key are expanded, so that the output rates of the first grouping key and the second grouping key are improved, and the rates of the data key and the modulation key are matched with the rate of the plaintext electric signal. Optionally, the data key and the modulation key have the rate of 15Gbit/s and the period of 2^ s256-1. Optionally, the type of the feedback function stored in the linear feedback shift register is set to 8, the feedback function is randomly selected by the upper 3 bits of the first group key and the second group key, and after each update of the first group key and the second group key, the feedback function is replaced by the upper 3 bits of the updated first group key and the updated second group key, so as to provide a new data key and a new modulation key.
The data coding encryptor 15 is configured to receive a plaintext electric signal of 10GE-LAN (Gigabit Ethernet-local area network) with a clock rate of 12.5G; carrying out protocol extension of encryption communication on the plaintext electric signal, and increasing the clock rate of the plaintext electric signal to 15G; and carrying out bit-by-bit XOR operation on the plaintext electric signal after the protocol expansion and the data key to obtain a ciphertext electric signal. In this way, polarity scrambling of the plaintext signal data is achieved.
The signal modulation encryptor 16 provides an intensity modulation based randomized spread modulation encryption function, the signal modulation encryptor 16 is configured to set the modulation voltage with the modulator built in the signal modulation encryptor, divide the modulation amplitude domain into 12 half-amplitude modulation basis vector combinations, provide 2^ 2124096 sets of modulation domain spreading values; grouping the modulation keys to obtain a modulation key group with the length of 12 bits; and setting the output voltage of a digital-analog converter with 12bit resolution in a modulation controller arranged in the signal modulation encryptor, and converting the ciphertext electric signal into a ciphertext optical signal through intensity modulation. Wherein, in the case that the high bit of the packet of the modulation key is 0, the polarity of the modulation basis vector is unchanged; in the case where the high bit of the packet of the modulation key is 1, the polarity of the modulation basis vector is reversed.
The second FPGA control system 18 is configured to receive the initial key; the data key and the modulation key are obtained using the same settings and methods as the first FPGA control system 15.
The signal demodulation detector 19 is configured to perform ciphertext optical signal detection, i.e., signal sampling on the ciphertext optical signal by using an analog-to-digital converter (ADC) with a resolution of 12 bits, which is built in the signal demodulation detector 19; and performing photoelectric demodulation on the sampled ciphertext relation user. Optionally, in a signal decision stage of the photoelectric demodulation, a modulation domain expansion combination the same as that of the sender is generated, and according to the modulation key and the modulation domain expansion combination, the demodulation and reception of the ciphertext optical signal are realized, and the ciphertext electric signal is recovered.
The data decoding decryptor 20 is configured to perform bit-by-bit exclusive-or operation on the data key and the ciphertext electric signal, and perform encryption communication protocol decoding to recover a plaintext electric signal of 10 GE-LAN.
Embodiments of the present disclosure provide a storage medium storing computer-executable instructions configured to perform the above-described method for quantum secure communications.
The disclosed embodiments provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the above-described method for quantum secure communication.
The computer-readable storage medium described above may be a transitory computer-readable storage medium or a non-transitory computer-readable storage medium.
The technical solution of the embodiments of the present disclosure may be embodied in the form of a software product, where the computer software product is stored in a storage medium and includes one or more instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium comprising: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes, and may also be a transient storage medium.
The above description and drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. Furthermore, the words used in the specification are words of description only and are not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising an …" does not exclude the presence of other like elements in a process, method or apparatus that comprises the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by the skilled person that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be merely a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than disclosed in the description, and sometimes there is no specific order between the different operations or steps. For example, two sequential operations or steps may in fact be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (10)

1. A method for quantum secure communication is applied to a quantum secure communication sending end, and the method comprises the following steps:
generating an initial key by using Quantum Key Distribution (QKD);
expanding the initial key to obtain a data key and a modulation key;
encrypting the plaintext electric signal by using the data key to obtain a ciphertext electric signal;
generating a modulation control signal using the modulation key;
and electro-optically modulating the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and sending the ciphertext optical signal to a quantum secret communication receiving end.
2. The method of claim 1, wherein spreading the initial key to obtain a data key and a modulation key comprises:
and intercepting two different groups from the initial key, and respectively expanding the two intercepted groups to obtain a data key and a modulation key.
3. The method of claim 1, wherein encrypting the plaintext electrical signal using the data key comprises:
and carrying out bit-by-bit exclusive-or logic operation on the plain electric signals by utilizing the data key.
4. The method of claim 1, wherein generating a modulation control signal using the modulation key comprises:
generating a modulation basis vector combination of a half-amplitude modulation domain;
and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key to obtain a modulation control signal.
5. A method for quantum secure communication, which is applied to a quantum secure communication receiving end, the method comprising:
generating an initial key by using Quantum Key Distribution (QKD);
expanding the initial key to obtain a data key and a modulation key;
generating a demodulation control signal by using the modulation key;
demodulating the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal;
and decrypting the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
6. The method of claim 5, wherein spreading the initial key to obtain a data key and a modulation key comprises:
and intercepting two different groups from the initial key, and respectively expanding the two intercepted groups to obtain a data key and a modulation key.
7. The method of claim 5, wherein generating a demodulation control signal using the modulation key comprises:
generating a modulation basis vector combination of a half-amplitude modulation domain;
and selecting the polarity of each modulation basis vector in the modulation basis vector combination according to the high order of the grouping of the modulation key to obtain a demodulation control signal.
8. The method of claim 5, wherein decrypting the ciphertext electrical signal using the data key comprises:
and carrying out bit-by-bit exclusive OR logic operation on the ciphertext electric signal by using the data key.
9. An apparatus for quantum secure communication, applied to a quantum secure communication sending end, the apparatus comprising:
a quantum key distribution sending module configured to generate an initial key using Quantum Key Distribution (QKD);
a sender key expansion module configured to expand the initial key to obtain a data key and a modulation key;
the data encryption module is configured to encrypt a plaintext electric signal by using the data key to obtain a ciphertext electric signal;
a randomized modulation spreading module configured to generate a modulation control signal using the modulation key;
and the electro-optical modulation module is configured to perform electro-optical modulation on the ciphertext electric signal by using the modulation control signal to obtain a ciphertext optical signal, and send the ciphertext optical signal to a quantum secret communication receiving end.
10. An apparatus for quantum secure communication, applied to a quantum secure communication receiving end, the apparatus comprising:
a quantum key distribution receiving module configured to generate an initial key using quantum key distribution QKD;
a receiver key expansion module configured to expand the initial key to obtain a data key and a modulation key;
a randomized demodulation adaptation module configured to generate a demodulation control signal using the modulation key;
the photoelectric detection demodulation module is configured to demodulate the detected ciphertext optical signal by using the demodulation control signal to obtain a ciphertext electric signal;
and the data decryption module is configured to decrypt the ciphertext electric signal by using the data key to obtain a plaintext electric signal.
CN202110849002.8A 2021-07-27 2021-07-27 Method and device for quantum secure communication Active CN113691370B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110849002.8A CN113691370B (en) 2021-07-27 2021-07-27 Method and device for quantum secure communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110849002.8A CN113691370B (en) 2021-07-27 2021-07-27 Method and device for quantum secure communication

Publications (2)

Publication Number Publication Date
CN113691370A true CN113691370A (en) 2021-11-23
CN113691370B CN113691370B (en) 2023-01-13

Family

ID=78577906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110849002.8A Active CN113691370B (en) 2021-07-27 2021-07-27 Method and device for quantum secure communication

Country Status (1)

Country Link
CN (1) CN113691370B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115276824A (en) * 2022-07-26 2022-11-01 中国人民解放军国防科技大学 Quantum noise stream encryption transmitter, receiver, communication system and method
CN116647285A (en) * 2023-07-24 2023-08-25 之江实验室 Signal encryption and decryption system and method and communication system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160254646A1 (en) * 2015-02-26 2016-09-01 California Institute Of Technology Optical frequency divider based on an electro-optical-modulator frequency comb
CN107040376A (en) * 2017-05-18 2017-08-11 烽火通信科技股份有限公司 A kind of method and system of quantum secure optic communication
CN107769859A (en) * 2017-10-19 2018-03-06 华中科技大学 A kind of security photo-communication system based on phase amplitude conversion
CN108833390A (en) * 2018-06-05 2018-11-16 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
CN112073190A (en) * 2020-09-01 2020-12-11 上海循态信息科技有限公司 Quantum noise password communication method and system for randomly modulating phase and amplitude

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160254646A1 (en) * 2015-02-26 2016-09-01 California Institute Of Technology Optical frequency divider based on an electro-optical-modulator frequency comb
CN107040376A (en) * 2017-05-18 2017-08-11 烽火通信科技股份有限公司 A kind of method and system of quantum secure optic communication
CN107769859A (en) * 2017-10-19 2018-03-06 华中科技大学 A kind of security photo-communication system based on phase amplitude conversion
CN108833390A (en) * 2018-06-05 2018-11-16 中国人民解放军国防科技大学 Matrix transformation-based packet physical layer encryption method
CN112073190A (en) * 2020-09-01 2020-12-11 上海循态信息科技有限公司 Quantum noise password communication method and system for randomly modulating phase and amplitude

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115276824A (en) * 2022-07-26 2022-11-01 中国人民解放军国防科技大学 Quantum noise stream encryption transmitter, receiver, communication system and method
CN116647285A (en) * 2023-07-24 2023-08-25 之江实验室 Signal encryption and decryption system and method and communication system
CN116647285B (en) * 2023-07-24 2023-10-10 之江实验室 Signal encryption and decryption system and method and communication system

Also Published As

Publication number Publication date
CN113691370B (en) 2023-01-13

Similar Documents

Publication Publication Date Title
KR101446629B1 (en) Apparatus and method for secure data transmission in wireless communication system
Cho et al. Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution
US8995652B1 (en) Streaming one time pad cipher using rotating ports for data encryption
CN113691370B (en) Method and device for quantum secure communication
KR101491778B1 (en) Apparatus and method for secure data transmission using relay
US20080101607A1 (en) Streaming implementation of AlphaEta physical layer encryption
US10171238B2 (en) Secure data transmission using quantum communication
CN110855438B (en) Quantum key distribution method and system based on annular QKD network
CN105577360A (en) OOFDM (Optical Orthogonal Frequency Division Multiplexing) encryption system based on chaos sequence mapping
CN107819760B (en) Symmetric key generation and distribution secret communication system based on wireless channel characteristics
US10756891B2 (en) Secure data communication
JP4889630B2 (en) Optical transmission apparatus and method for ciphertext transmission
Wang Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference
KR20060011999A (en) Des algorithm-based encryption method
JP2013021422A (en) Cipher transmission device
KR100797106B1 (en) Method for encrypting and decrypting transmmited and received packet in wireless lan
CN104579645A (en) Secret key updating method based on AES encryption system
US7231048B2 (en) Key sharing system, public key cryptosystem, signature system, key sharing apparatus, encryption apparatus, decryption apparatus, signature apparatus, authentication apparatus, key sharing method, encryption method, decryption method, signature method, authentication method, and programs
Ahmad et al. Energy efficient sensor network security using Stream cipher mode of operation
JP2006157639A (en) Cipher transmitter
CN112615718B (en) Hash function-based key updating method for sequence cipher encryption system
KR20010008808A (en) Encryption method by scramble on wlan
JP2000004223A (en) Encryption/authentication system
CN112235071B (en) Safety encryption method based on FPGA modulation switching and optical communication device
Lee Highly reliable synchronous stream cipher system for link encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant