CN114071461B - 5G communication module based on quantum key encryption - Google Patents

5G communication module based on quantum key encryption Download PDF

Info

Publication number
CN114071461B
CN114071461B CN202111342028.XA CN202111342028A CN114071461B CN 114071461 B CN114071461 B CN 114071461B CN 202111342028 A CN202111342028 A CN 202111342028A CN 114071461 B CN114071461 B CN 114071461B
Authority
CN
China
Prior art keywords
module
quantum key
quantum
internet
control module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111342028.XA
Other languages
Chinese (zh)
Other versions
CN114071461A (en
Inventor
王成金
赵良圆
曹凌云
程万里
曹子建
沈明
杜佳静
韦峥
梁洪源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Original Assignee
Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd filed Critical Jiangsu Hengtong Wentian Quantum Information Research Institute Co Ltd
Priority to CN202111342028.XA priority Critical patent/CN114071461B/en
Publication of CN114071461A publication Critical patent/CN114071461A/en
Application granted granted Critical
Publication of CN114071461B publication Critical patent/CN114071461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application relates to a 5G communication module based on quantum key encryption, which comprises a 5G module, a secure storage module and a quantum key management and control module, wherein the 5G module is provided with the secure storage module and the quantum key management and control module, the secure storage module is communicated with the quantum key management and control module and is used for completing identity authentication and quantum key distribution of the 5G module by utilizing a quantum certificate, and the distributed quantum key is used for completing 5G service data encryption transmission. According to the application, the secure storage module and the quantum key management and control module are added on the 5G module, the problems of identity authentication and transmission encryption of 5G module equipment are solved by utilizing the quantum key, so that the risk of key leakage can be prevented, the key maintenance cost can be reduced, the attack of quantum computation and quantum algorithm can be resisted, and the secure wireless network communication can be provided for the Internet of things using 5G.

Description

5G communication module based on quantum key encryption
Technical Field
The application relates to the technical field of 5G communication, in particular to a 5G communication module based on quantum key encryption.
Background
The 5G is a new generation mobile communication system developed towards the mobile communication demand after 2020, the 5G has ultrahigh frequency spectrum utilization rate and energy efficiency, the transmission rate and the frequency spectrum resource utilization rate are improved by one order of magnitude or higher than those of the 4G mobile communication, and the wireless coverage performance, the transmission delay, the system safety and the user experience are also obviously improved. The 5G mobile communication is closely combined with other wireless mobile communication technologies to form a new generation ubiquitous mobile information network, and the development requirement of 1000 times of mobile internet traffic increase in the next 10 years is met. The application field of the 5G mobile communication system will be further expanded, and the supporting capability for mass sensing equipment and machine-to-machine (M2M) communication will become one of the important indexes of system design. Future 5G systems also need to have sufficient flexibility and intelligent capabilities such as network self-awareness and self-tuning to cope with the rapid changes that are difficult to predict in future mobile information society. The 5G era not only can bring users with ultra-high bandwidth, ultra-low time delay and ultra-large scale connection to the users, but also can bring more diversified service demands to the mobile network by the abundant vertical industry application, especially the application of two innovative functions of network slicing and capability opening, change the traditional service operation mode and operation mode, create customized 'industry private network' service for each industry user, better meet the service differentiation demands, and further promote the autonomous controllability and operation efficiency of the enterprise to own service.
The 5G application has higher development difficulty, overlong development period and diversified industry requirements, and restricts the application development of the 5G in the industry scale. The generation of 5G modules accelerates the popularization of industrial Internet and is helpful for promoting the high-quality development of manufacturing industry. The 5G module can adapt to various application scenes, simplifies the design of terminal products, has key significance for the uncertainty of the existing technical level and the diversity of terminal requirements, and has key effect for promoting the acceleration of the maturation of industry and promoting the 5G floor business.
As performance and security requirements of communication networks continue to increase, 5G communication technology has evolved rapidly and has received unprecedented attention. However, the 5G still faces some security challenges, when the 5G wireless network communicates, the huge data flow contains a large amount of privacy and sensitive information in the network, in order to ensure that the privacy is not leaked, it is necessary to combine the 5G with the cryptography knowledge, and in terms of security research, 3GPP, 5GPPP, NGMN, ITU-2020 advance groups, ericsson, nokia and Hua to also issue respective 5G security requirements white papers, but the currently proposed security scheme is based on the traditional digital certificate authentication and key negotiation algorithm, and the security of the key exchange process and the security of the encryption and decryption algorithm are dependent, wherein the key distribution process mainly depends on public key cryptography, and the security is mainly based on the computational complexity of mathematical difficulty problems such as prime number decomposition, discrete logarithm, elliptic curve and the like, and mainly has the following problems: 1) The main problem of the symmetric key cryptosystem is that the same key is used by both encryption and decryption, so that the problem of unilateral key leakage of a sender or a receiver is easy to occur; 2) In the communication with n parties, if the n parties all adopt the same symmetric key, once the key is cracked, the whole cipher system is crashed; if different symmetric keys are adopted, n (n-1) keys are needed, the number of the keys is in direct proportion to the square number of the number of people participating in communication, and the management of the keys is almost impossible; 3) Key distribution is the weakest link in the encryption system, and if the period of key update is prolonged, opportunities are provided for others to decipher the key.
The quantum secret communication is a communication technology for transmitting information by using quantum bits as information carriers, and is an advanced communication technology for transmitting information and transmitting data by using quantum mechanics basic principles and quantum entanglement phenomena. The quantum secret communication technology provides a unique high-safety communication secret mode so far, and breaks through the safety secret and information capacity limit of the traditional information technology. If the quantum secret communication technology is combined with the 5G wireless communication technology, the method can ensure that the safety of transmitted data is not stolen by a destructor while enjoying the 5G high bandwidth and low delay, thereby ensuring the normal operation of the Internet of things equipment and an application system, and therefore, the combination of the quantum secret communication technology and the 5G wireless communication technology has important significance.
Disclosure of Invention
Therefore, the technical problem to be solved by the application is to overcome the problems existing in the prior art, and a 5G communication module based on quantum key encryption is provided, a safe storage module and a quantum key management and control module are added on the 5G module, the identity authentication of 5G module equipment is completed by utilizing quantum key encryption, the quantum key is distributed to the 5G module equipment and the communication Internet of things server equipment which are mutually communicated through key distribution service, the problems of the identity authentication and transmission encryption of the 5G module equipment are solved by utilizing the quantum key, the key leakage risk can be prevented, the key maintenance cost can be reduced, and the attack of quantum computation and quantum algorithm can be resisted, so that the data security of 5G communication is ensured, and the safe wireless network communication can be provided for the Internet of things using 5G.
In order to solve the technical problems, the application provides a 5G communication module based on quantum key encryption, which comprises a 5G module, a secure storage module and a quantum key management and control module, wherein the 5G module is provided with the secure storage module and the quantum key management and control module, the secure storage module is communicated with the quantum key management and control module and is used for completing identity authentication and quantum key distribution of the 5G module by utilizing a quantum certificate, and 5G service data encryption transmission is completed by using the distributed quantum key.
In one embodiment of the present application, the secure storage module includes a quantum key storage unit, where the quantum key storage unit is connected to the quantum key management module, and the quantum key storage unit is configured to receive and store a quantum key generated by the quantum key management module.
In one embodiment of the present application, the secure storage module includes a quantum certificate storage unit, which is connected to the quantum key management module, and the quantum certificate storage unit is configured to receive and store a quantum certificate generated by the quantum key management module.
In one embodiment of the present application, the communication method for completing the identity authentication of the 5G module by using the secure storage module and the quantum key management module includes:
storing a quantum key by using the quantum key management and control module; generating a quantum certificate of the 5G module and a quantum certificate of the Internet of things server based on the quantum key, and respectively importing the quantum certificate and the quantum certificate to the 5G module and the Internet of things server; the Internet of things server and the 5G module respectively obtain an Internet of things server identifier and a 5G module identifier by utilizing key encryption information of a quantum certificate of the Internet of things server and the 5G module, and respectively complete identity authentication of the Internet of things server and the 5G module by utilizing the Internet of things server identifier and the 5G module identifier.
In one embodiment of the present application, after the identity authentication of the internet of things server and the 5G module is completed, the identity authentication of the quantum key management and control module needs to be completed.
In one embodiment of the present application, the step of completing the identity authentication of the internet of things server by using the internet of things server identifier includes:
the method comprises the steps that an Internet of things server sends an Internet of things server identifier to a quantum key management and control module, the quantum key management and control module decrypts the Internet of things server identifier to obtain decryption information, the decryption information is compared with registration information of the Internet of things server in content, and if the content is consistent, the Internet of things server is successfully authenticated.
In one embodiment of the present application, the step of completing the identity authentication of the 5G module using the 5G module identifier includes:
the 5G module sends the 5G module identification to the quantum key management and control module, the quantum key management and control module decrypts the quantum key management and control module to obtain decryption information, the decryption information is compared with registration information of the 5G module in content, and if the content is consistent, the 5G module authentication is successful.
In one embodiment of the present application, the method for completing quantum key distribution of the 5G module using quantum certificates includes:
the 5G module negotiates a first session key for quantum key distribution with the quantum key management and control module, and simultaneously the Internet of things server negotiates a second session key for quantum key distribution with the quantum key management and control module; the 5G module and the Internet of things server are communicated with the quantum key management and control module by using a corresponding first session key and a corresponding second session key respectively, and are used for acquiring the quantum keys symmetrical at two ends of the communication and distributing the quantum keys to the two ends of the communication respectively; and the Internet of things server communicates with the Internet of things terminal through the 5G module encrypted by the quantum key.
In one embodiment of the present application, the quantum key distribution method of the 5G module includes:
the method comprises the steps that the 5G module generates encryption request information and sends the encryption request information to the quantum key management and control module, the quantum key management and control module judges whether the 5G module is effective after decrypting the encryption request information, if not, the encryption request is ended, if yes, whether the information of the Internet of things server corresponding to the 5G module can be queried is continuously judged, if not, the encryption request is ended, if yes, the quantum key management and control module determines a quantum key and encrypts the quantum key, then the quantum key is sent to the Internet of things server, and the Internet of things server receives the quantum key and sends the quantum key to the 5G module.
In an embodiment of the present application, a correspondence between the 5G module and the internet of things server is stored in the quantum key management module in advance.
Compared with the prior art, the technical scheme of the application has the following advantages:
according to the application, the secure storage module and the quantum key management and control module are added on the 5G module, the identity authentication of the 5G module equipment is completed by utilizing the quantum key encryption, the quantum key is distributed to the 5G module equipment and the communication Internet of things server equipment which are mutually communicated through the key distribution service, the problems of the identity authentication and the transmission encryption of the 5G module equipment are solved by utilizing the quantum key, the key leakage risk can be prevented, the key maintenance cost can be reduced, and the attack of quantum computation and quantum algorithm can be resisted, so that the data security of the 5G communication is ensured, and the secure wireless network communication can be provided for the Internet of things using the 5G.
Drawings
In order that the application may be more readily understood, a more particular description of the application will be rendered by reference to specific embodiments thereof that are illustrated in the appended drawings.
Fig. 1 is a schematic hardware structure of a 5G communication module according to the present application based on quantum key encryption.
Fig. 2 is a schematic hardware structure of a secure memory module in the 5G communication module based on quantum key encryption according to the present application.
Fig. 3 is a flow chart of a communication method for implementing 5G module identity authentication according to the present application.
Fig. 4 is a flow chart of a method for completing quantum key distribution of the 5G module by using quantum certificate according to the present application.
Wherein reference numerals are as follows: 10. a 5G module; 20. a secure storage module; 21. a quantum key storage unit; 22. a quantum certificate storage unit; 30. and the quantum key management and control module.
Detailed Description
The present application will be further described with reference to the accompanying drawings and specific examples, which are not intended to be limiting, so that those skilled in the art will better understand the application and practice it.
Referring to fig. 1 to 4, an embodiment of the present application provides a 5G communication module based on quantum key encryption, which includes a 5G module 10, a secure storage module 20 and a quantum key management module 30, wherein the 5G module 10 is provided with the secure storage module 20 and the quantum key management module 30, the secure storage module 20 communicates with the quantum key management module 30, and is configured to utilize a quantum certificate to complete identity authentication and quantum key distribution of the 5G module 10, and use the distributed quantum key to complete encrypted transmission of 5G service data.
The 5G module 10 described in the disclosure of the present application may be a 5G module 10 in the prior art, and the 5G module 10 has all functions of itself.
In the 5G communication module based on quantum key encryption disclosed by the application, a secure storage module 20 and a quantum key management module 30 are added in the 5G module 10, wherein the secure storage module 20 is communicated with the quantum key management module 30, and hardware-level secure data storage is provided through the secure storage module 20.
In the disclosed 5G communication module based on quantum key encryption, a quantum certificate is introduced into the secure storage module 20 when the 5G module 10 is initialized, a key distribution program is implanted into the quantum key management module 30, the key distribution program is started after the 5G module 10 is powered on, the key distribution program acquires the quantum certificate from the secure storage module 20, and is connected with the quantum key management module 30 through a network module, and authentication is completed by utilizing the key of the quantum certificate and the quantum key management module 30, so that the quantum key is acquired and stored in the secure storage module 20.
In the 5G communication module based on quantum key encryption disclosed in the present application, when the 5G module 10 communicates, the key distribution program encrypts data sent in the communication process by using the quantum key of the secure storage module 20, and on the other hand, when receiving the data, the key distribution program finds out the corresponding quantum key in the secure storage module 20 to complete the decryption work of the received data.
In the disclosed 5G communication module based on quantum key encryption, the secure storage module 20 includes a quantum key storage unit 21, the quantum key storage unit 21 is connected to the quantum key management module 30, and the quantum key storage unit 21 is configured to receive and store a quantum key generated by the quantum key management module 30.
In the disclosed 5G communication module based on quantum key encryption, the secure storage module 20 includes a quantum certificate storage unit 22, the quantum certificate storage unit 22 is connected to the quantum key management module 30, and the quantum certificate storage unit 22 is configured to receive and store a quantum certificate generated by the quantum key management module 30.
In the disclosed 5G communication module based on quantum key encryption, referring to fig. 3, the communication method for completing the identity authentication of the 5G module 10 by the secure storage module 20 and the quantum key management and control module 30 includes the following steps:
s101: storing a quantum key with the quantum key management module 30;
s102: generating a quantum certificate of the 5G module 10 and a quantum certificate of an Internet of things server based on the quantum key, and respectively importing the quantum certificate and the quantum certificate to the 5G module 10 and the Internet of things server;
s103: the internet of things server and the 5G module 10 respectively obtain an internet of things server identifier and a 5G module 10 identifier by utilizing key encryption information of a quantum certificate of the internet of things server and the 5G module 10, and respectively complete identity authentication of the internet of things server and the 5G module 10 by utilizing the internet of things server identifier and the 5G module 10 identifier.
In the disclosed 5G communication module based on quantum key encryption, in step S101, storing the quantum key by using the quantum key management module 30 includes: the quantum key management module 30 may be connected to a quantum random number generator or a quantum chip, where the quantum random number generator or the quantum chip generates a quantum key and sends the quantum key to the quantum key management module 30, and the quantum key management module 30 receives the quantum key and stores the quantum key, for example, the quantum key management module 30 includes a key pool, and the quantum key may be stored using the key pool.
In the step S102, the quantum certificate includes an initial quantum key, and the generated quantum certificate of the 5G module 10 and the quantum certificate of the internet of things server are respectively imported into the 5G module 10 and the internet of things server, and are used for identity authentication and identification and replacement of a new quantum key through the quantum digital certificate.
In the 5G communication module based on quantum key encryption disclosed in the present application, in step S103, the step of completing the identity authentication of the internet of things server by using the internet of things server identifier includes: the internet of things server sends the internet of things server identifier to the quantum key management and control module 30, the quantum key management and control module 30 decrypts the internet of things server identifier to obtain decryption information, the decryption information is compared with registration information of the internet of things server in content, and if the content is consistent, the internet of things server is successfully authenticated.
In the disclosed 5G communication module based on quantum key encryption, in step S103, the step of completing the identity authentication of the 5G module 10 by using the 5G module 10 identifier includes: the 5G module 10 sends the identifier of the 5G module 10 to the quantum key management and control module 30, the quantum key management and control module 30 decrypts the identifier to obtain decryption information, and compares the decryption information with registration information of the 5G module 10, and if the content is consistent, the authentication of the 5G module 10 is successful.
In the 5G communication module based on quantum key encryption disclosed in the present application, in step S103, after the identity authentication of the internet of things server and the 5G module 10 is completed, the identity authentication of the quantum key management and control module 30 needs to be completed. Specifically, the quantum key management and control module 30 encrypts self information by using a key to obtain a quantum key management and control module 30 identifier, the quantum key management and control module 30 identifier is sent to an internet of things server, and the internet of things server decrypts and compares the information of the quantum key management and control module 30 by using the key of a quantum certificate, and the comparison is successful in completing the bidirectional identity authentication; and the quantum key management and control module 30 encrypts self information by using a key to obtain a quantum key management and control module 30 identifier, the quantum key management and control module 30 identifier is sent to the 5G module 10, the 5G module 10 decrypts and compares the information of the quantum key management and control module 30 by using the key of the quantum certificate, and the comparison is successful in completing the bidirectional identity authentication.
In the disclosed 5G communication module based on quantum key encryption, referring to fig. 4, the method for completing quantum key distribution of the 5G module 10 by using quantum certificate includes the following steps:
s201: the 5G module 10 negotiates a first session key for quantum key distribution with the quantum key management and control module 30, and simultaneously the internet of things server negotiates a second session key for quantum key distribution with the quantum key management and control module 30;
s202: the 5G module 10 and the internet of things server communicate with the quantum key management and control module 30 by using the corresponding first session key and second session key, respectively, and are configured to obtain quantum keys symmetric at two communication ends and respectively distribute the quantum keys to the two communication ends;
s203: the internet of things server communicates with the internet of things terminal through the 5G module 10 encrypted by the quantum key.
In the disclosed 5G communication module based on quantum key encryption, in step S202, the quantum key distribution method of the 5G module 10 includes the following steps:
s301: the 5G module 10 generates encryption request information and sends the encryption request information to the quantum key management and control module 30;
s302: the quantum key management and control module 30 decrypts the encryption request information and then judges whether the 5G module 10 is valid, if not, the encryption request is ended, if yes, whether the internet of things server information corresponding to the 5G module 10 can be queried is continuously judged, if no, the encryption request is ended, and if yes, the quantum key management and control module 30 determines a quantum key and encrypts;
s303: and sending the quantum key to the Internet of things server, wherein the Internet of things server receives the quantum key and sends the quantum key to the 5G module 10.
In the quantum key encryption-based 5G communication module disclosed in the present application, the correspondence between the 5G module 10 and the internet of things server is stored in the quantum key management and control module 30 in advance.
In the 5G communication module based on quantum key encryption disclosed by the application, the secure storage module 20 and the quantum key management and control module 30 are added on the 5G module 10, the quantum key is used for completing the identity authentication of 5G module 10 equipment, the quantum key is distributed to the 5G module 10 equipment and the communication Internet of things server equipment which are mutually communicated through the key distribution service, the problems of the identity authentication and the transmission encryption of the 5G module 10 equipment are solved by using the quantum key, the risk of key leakage can be prevented, the key maintenance cost can be reduced, and the attacks of quantum computation and quantum algorithm can be resisted, so that the data security of 5G communication is ensured, and the secure wireless network communication can be provided for the Internet of things using 5G.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations and modifications of the present application will be apparent to those of ordinary skill in the art in light of the foregoing description. It is not necessary here nor is it exhaustive of all embodiments. And obvious variations or modifications thereof are contemplated as falling within the scope of the present application.

Claims (4)

1. The 5G communication module based on quantum key encryption is characterized by comprising a 5G module, a secure storage module and a quantum key management and control module, wherein the 5G module is provided with the secure storage module and the quantum key management and control module, the secure storage module is communicated with the quantum key management and control module and is used for completing identity authentication and quantum key distribution of the 5G module by utilizing a quantum certificate, and 5G service data encryption transmission is completed by using the distributed quantum key;
the communication method for completing the identity authentication of the 5G module by the secure storage module and the quantum key management and control module comprises the following steps:
storing a quantum key by using the quantum key management and control module; generating a quantum certificate of the 5G module and a quantum certificate of the Internet of things server based on the quantum key, and respectively importing the quantum certificate and the quantum certificate to the 5G module and the Internet of things server; the Internet of things server and the 5G module respectively obtain an Internet of things server identifier and a 5G module identifier by utilizing key encryption information of a quantum certificate of the Internet of things server and the 5G module, and respectively complete identity authentication of the Internet of things server and the 5G module by utilizing the Internet of things server identifier and the 5G module identifier;
after the identity authentication of the Internet of things server and the 5G module is completed, the identity authentication of the quantum key management and control module is required to be completed;
the step of completing the identity authentication of the Internet of things server by using the Internet of things server identifier comprises the following steps:
the Internet of things server sends the Internet of things server identifier to the quantum key management and control module, the quantum key management and control module decrypts the Internet of things server identifier to obtain decryption information, the decryption information is compared with registration information of the Internet of things server in content, and if the content is consistent, the authentication of the Internet of things server is successful;
the step of completing the identity authentication of the 5G module by using the 5G module identifier comprises the following steps:
the 5G module sends the 5G module identification to the quantum key management and control module, the quantum key management and control module decrypts the quantum key management and control module to obtain decryption information, the decryption information is compared with registration information of the 5G module in content, and if the content is consistent, the 5G module authentication is successful;
the method for completing quantum key distribution of the 5G module by using the quantum certificate comprises the following steps:
the 5G module negotiates a first session key for quantum key distribution with the quantum key management and control module, and simultaneously the Internet of things server negotiates a second session key for quantum key distribution with the quantum key management and control module; the 5G module and the Internet of things server are communicated with the quantum key management and control module by using a corresponding first session key and a corresponding second session key respectively, and are used for acquiring the quantum keys symmetrical at two ends of the communication and distributing the quantum keys to the two ends of the communication respectively; the 5G module after being encrypted by the quantum key communicates with an Internet of things terminal;
the quantum key distribution method of the 5G module comprises the following steps:
the method comprises the steps that the 5G module generates encryption request information and sends the encryption request information to the quantum key management and control module, the quantum key management and control module judges whether the 5G module is effective after decrypting the encryption request information, if not, the encryption request is ended, if yes, whether the information of the Internet of things server corresponding to the 5G module can be queried is continuously judged, if not, the encryption request is ended, if yes, the quantum key management and control module determines a quantum key and encrypts the quantum key, then the quantum key is sent to the Internet of things server, and the Internet of things server receives the quantum key and sends the quantum key to the 5G module.
2. The quantum key encryption-based 5G communication module of claim 1, wherein: the secure storage module comprises a quantum key storage unit, wherein the quantum key storage unit is connected with the quantum key management and control module and is used for receiving and storing the quantum key generated by the quantum key management and control module.
3. The quantum key encryption-based 5G communication module of claim 1, wherein: the secure storage module comprises a quantum certificate storage unit, wherein the quantum certificate storage unit is connected with the quantum key management and control module and is used for receiving and storing the quantum certificate generated by the quantum key management and control module.
4. The quantum key encryption-based 5G communication module of claim 1, wherein: and the corresponding relation between the 5G module and the Internet of things server is prestored in the quantum key management and control module.
CN202111342028.XA 2021-11-12 2021-11-12 5G communication module based on quantum key encryption Active CN114071461B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111342028.XA CN114071461B (en) 2021-11-12 2021-11-12 5G communication module based on quantum key encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111342028.XA CN114071461B (en) 2021-11-12 2021-11-12 5G communication module based on quantum key encryption

Publications (2)

Publication Number Publication Date
CN114071461A CN114071461A (en) 2022-02-18
CN114071461B true CN114071461B (en) 2023-11-03

Family

ID=80271977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111342028.XA Active CN114071461B (en) 2021-11-12 2021-11-12 5G communication module based on quantum key encryption

Country Status (1)

Country Link
CN (1) CN114071461B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471584A (en) * 2015-12-04 2016-04-06 长春大学 Identity authentication method based on quantum key encryption
CN109756877A (en) * 2018-12-05 2019-05-14 西安电子科技大学 A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment
CN110557253A (en) * 2019-10-14 2019-12-10 成都量安区块链科技有限公司 Relay route acquisition method, device and application system
CN110572265A (en) * 2019-10-24 2019-12-13 国网山东省电力公司信息通信公司 terminal security access gateway method, device and system based on quantum communication
CN110650009A (en) * 2019-09-23 2020-01-03 中国联合网络通信集团有限公司 Mobile network and communication method
CN110690962A (en) * 2019-09-01 2020-01-14 成都量安区块链科技有限公司 Application method and device of service node
CN110808834A (en) * 2019-11-15 2020-02-18 中国联合网络通信集团有限公司 Quantum key distribution method and quantum key distribution system
WO2020223319A1 (en) * 2019-05-01 2020-11-05 Nix John A Distributed eap-tls authentication for wireless networks with concealed subscriber identities
WO2020260751A1 (en) * 2019-06-27 2020-12-30 Nokia Technologies Oy Encrypted communication based on quantum key
CN112367124A (en) * 2019-09-01 2021-02-12 成都量安区块链科技有限公司 Quantum relay node virtualization method and device
WO2021090027A1 (en) * 2019-11-08 2021-05-14 Arqit Limited Quantum-safe networking
CN112865966A (en) * 2021-02-05 2021-05-28 安徽华典大数据科技有限公司 Identity authentication method based on quantum key encryption
WO2021104448A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Method for synchronizing key information, system and device
WO2021147660A1 (en) * 2020-01-21 2021-07-29 华为技术有限公司 Data transmission method, and device
CN113596062A (en) * 2021-09-01 2021-11-02 江西雕视信息技术股份有限公司 Intelligent desktop cloud terminal based on quantum security

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471584A (en) * 2015-12-04 2016-04-06 长春大学 Identity authentication method based on quantum key encryption
CN109756877A (en) * 2018-12-05 2019-05-14 西安电子科技大学 A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment
WO2020223319A1 (en) * 2019-05-01 2020-11-05 Nix John A Distributed eap-tls authentication for wireless networks with concealed subscriber identities
WO2020260751A1 (en) * 2019-06-27 2020-12-30 Nokia Technologies Oy Encrypted communication based on quantum key
CN112367124A (en) * 2019-09-01 2021-02-12 成都量安区块链科技有限公司 Quantum relay node virtualization method and device
CN110690962A (en) * 2019-09-01 2020-01-14 成都量安区块链科技有限公司 Application method and device of service node
CN110650009A (en) * 2019-09-23 2020-01-03 中国联合网络通信集团有限公司 Mobile network and communication method
CN110557253A (en) * 2019-10-14 2019-12-10 成都量安区块链科技有限公司 Relay route acquisition method, device and application system
CN110572265A (en) * 2019-10-24 2019-12-13 国网山东省电力公司信息通信公司 terminal security access gateway method, device and system based on quantum communication
WO2021090027A1 (en) * 2019-11-08 2021-05-14 Arqit Limited Quantum-safe networking
CN110808834A (en) * 2019-11-15 2020-02-18 中国联合网络通信集团有限公司 Quantum key distribution method and quantum key distribution system
WO2021104448A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Method for synchronizing key information, system and device
CN112995990A (en) * 2019-11-30 2021-06-18 华为技术有限公司 Method, system and equipment for synchronizing key information
WO2021147660A1 (en) * 2020-01-21 2021-07-29 华为技术有限公司 Data transmission method, and device
CN112865966A (en) * 2021-02-05 2021-05-28 安徽华典大数据科技有限公司 Identity authentication method based on quantum key encryption
CN113596062A (en) * 2021-09-01 2021-11-02 江西雕视信息技术股份有限公司 Intelligent desktop cloud terminal based on quantum security

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System;Jin Cao;IEEE Internet of Things Journal;全文 *
基于设备与信道特征的物理层安全方法;李古月;俞佳宝;胡爱群;;密码学报(第02期);全文 *
量子保密通信网络架构及移动化应用方案;王健全;马彰超;李新中;孙雷;胡昌玮;;电信科学(第09期);全文 *

Also Published As

Publication number Publication date
CN114071461A (en) 2022-02-18

Similar Documents

Publication Publication Date Title
EP3432532B1 (en) Key distribution and authentication method, apparatus and system
CN109412794B (en) Quantum key automatic charging method and system suitable for power business
US8600063B2 (en) Key distribution system
CN101651539A (en) updating and distributing encryption keys
CN101159639B (en) One-way access authentication method
US20100235638A1 (en) Identification and authentication of devices in a network
CN108173644A (en) Data transfer encryption method, device, storage medium, equipment and server
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN114124388B (en) Gossip protocol synchronization method based on quantum key
WO2014131356A1 (en) Method, system, and terminal for hierarchical management of group keys of broadband cluster system
CN115632779B (en) Quantum encryption communication method and system based on power distribution network
US20020199102A1 (en) Method and apparatus for establishing a shared cryptographic key between energy-limited nodes in a network
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
JP2014530553A (en) Group secret management by group members
CN114362944B (en) D2D secure mobile communication method and system based on quantum key
CN111478911A (en) Instant messaging encryption method adopting lightweight key exchange algorithm
WO2015139370A1 (en) Method of establishing small data secure transmission connection for mtc device group, and hss and system
CN101431409B (en) Method for implementing secret communication in different wireless local area network
CN113193958A (en) High-safety high-efficiency quantum key service method and system
CN103856938A (en) Encryption and decryption method, system and device
CN114071461B (en) 5G communication module based on quantum key encryption
CN104065479A (en) Key generation method and system and key distribution method and system based on group
CN108260125B (en) Secret key distribution method of content distribution application based on D2D communication
CN107276755B (en) Security association method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant