CN114760051B - Key synchronization method and system - Google Patents

Key synchronization method and system Download PDF

Info

Publication number
CN114760051B
CN114760051B CN202210271300.8A CN202210271300A CN114760051B CN 114760051 B CN114760051 B CN 114760051B CN 202210271300 A CN202210271300 A CN 202210271300A CN 114760051 B CN114760051 B CN 114760051B
Authority
CN
China
Prior art keywords
key
bit
formula
data
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210271300.8A
Other languages
Chinese (zh)
Other versions
CN114760051A (en
Inventor
肖文奎
徐子龙
郑澍鹏
朱庆
谢小华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 7 Research Institute
Original Assignee
CETC 7 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 7 Research Institute filed Critical CETC 7 Research Institute
Priority to CN202210271300.8A priority Critical patent/CN114760051B/en
Publication of CN114760051A publication Critical patent/CN114760051A/en
Application granted granted Critical
Publication of CN114760051B publication Critical patent/CN114760051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Synchronisation In Digital Transmission Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a key synchronization method and a system thereof, wherein the method comprises the following steps: s1: the sender adds N bit bits of time synchronization information into the unencrypted data as a key synchronization code, and forms a data frame with the unencrypted data; s2: encrypting the unencrypted data according to the key synchronization code; performing key interception operation on the key synchronous code with N bit bits; s3: forming the encrypted data and the truncated key synchronous code into air interface data of a sender; s4: the receiving party receives the air interface data, and recovers the truncated key synchronous code in the air interface data into the same key synchronous code as the sending party by utilizing the local time synchronous information; s5: the receiving side decrypts the encrypted data according to the key synchronization code algorithm. The invention provides the decryption serial number transmission in a truncated mode for the receiving and transmitting parties on the narrow-band channel so as to realize the efficient transmission of data and correct encryption and decryption operation.

Description

Key synchronization method and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a key synchronization method and a system thereof.
Background
Generally, encryption and decryption (hereinafter referred to as cryptography) in communications employ a flow as shown in fig. 1. The cryptographic techniques are classified into symmetric cryptography and public key cryptography according to whether the encryption key and the decryption key are identical. The symmetric cipher processing speed of the encryption key and the decryption key is high, but the key distribution problem needs to be solved; public key ciphers with different encryption and decryption keys, although not requiring distribution of keys, cannot resist man-in-the-middle attacks and are complex to handle. In order to exert the advantages of two cryptographic techniques, a hybrid cryptographic system is often adopted in practical application, and the key characteristics are as follows:
1. encrypting the message with a symmetric cipher;
2. generating a session key for use in symmetric cryptographic encryption by a pseudo-random number generator;
3. encrypting the session key with a public key cipher;
4. The key used in public key cryptography encryption is given from outside the hybrid cryptography system.
In a secret communication system with a center, a public key for encrypting a message key is generally distributed to a receiving party and a transmitting party by a special key distribution center, and the key for encrypting the message is transmitted to a receiving party together with a ciphertext message after being generated by a transmitting party or is provided by a pseudo-random number generator synchronized with the receiving party and the transmitting party.
As shown in fig. 2, the frame number of the system air interface is used as a key synchronization code, and the frame number is not transmitted in real time with service data in the air, but both the transceiver and the transmitter maintain synchronization. By using the frame numbers of the transmitting and receiving parties as the key synchronous codes, although the transmission bandwidth is saved, under the cross-base-station scene, the frame numbers of different base stations have no correlation, and decryption is required to be completed after the network side lands. Then re-encrypting by using the key corresponding to the serial number of the receiving end, thereby increasing the encryption and decryption processing process and increasing the risk of plaintext transmission at the network side.
Disclosure of Invention
The invention provides a key synchronization method and a system thereof, which provide a truncated decryption serial number transmission for a transceiver on a narrow-band channel so as to realize efficient data transmission and correct encryption and decryption operation.
In order to achieve the above purpose of the present invention, the following technical scheme is adopted:
a method of key synchronization, said method comprising the steps of:
S1: the sender adds N bit bits of time synchronization information into the unencrypted data as a key synchronization code, and forms a data frame with the unencrypted data;
S2: encrypting the unencrypted data according to the key synchronization code; performing key interception operation on the key synchronous code with N bit bits;
s3: forming the encrypted data and the truncated key synchronous code into air interface data of a sender;
S4: the receiving party receives the air interface data, and recovers the truncated key synchronous code in the air interface data into the same key synchronous code as the sending party by utilizing the local time synchronous information;
s5: the receiver decrypts the encrypted data according to the key synchronization code algorithm.
Preferably, the N bit bits of time synchronization information t T indicates the time of encryption of the data frame, specifically:
tT=TfaT+TnfbT (1)
Wherein a T is the lower N low bits of N bit bits, the indicated time unit is the air interface frame period T f;bT is the upper (N bit-Nlow) bits of N bit bits, the indicated unit is Air interface frame period/>N low bits of the a T value are transmitted on the air interface and sent with the data frame to the receiver, and b T is not transmitted through the air interface.
Further, the receiver calculates and restores b T through the received a T and the local time at the time of receiving the data frame; then t T with N bit bytes is obtained, and sequence synchronous decryption is carried out according to the obtained t T; wherein, the recovery algorithm of b T is as follows:
The time when the receiver receives the data frame is denoted by t R:
Wherein Δt T represents the transmission delay of the data frame; Δt e is the time difference between the transmitting and receiving parties; a R、bR indicates the time when the receiving side receives the data frame, a R is the low N low bits of N bit bits, the unit of time is T f,bR is the high (N bit-Nlow) bits of N bit bits, and the unit of time is T nf.
Still further, since b T is not transmitted in the air interface, the receiver can only make the speculation on b T, which is specifically speculated as follows: assume that
I.e. the sum of the transmission delay and the time difference between the transmitting and receiving parties is smaller than
Expressed by the following formula (2) and formula (3)
Wherein a R、bR、aT、bT、Tf and T nf each represent a non-negative integer, and there is a constraint relationship:
Calculating the value of b T through the value range of T f(aR-aT).
Still further, for the range of values of T f(aR-aT), the following 7 cases are discussed:
1)Tf(aR-aT)=0
I.e., (a R-aT) =0, combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e., b T=bR;
this situation arises, indicating that the time difference between the two communicating parties exactly counteracts the transmission delay;
2)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) = -1, i.e. b T=bR +1;
3)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e. b T=bR;
I.e. Does not satisfy formula (4); in the case where the assumption is true, this does not occur;
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e. b T=bR;
6)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =1, i.e. b T=bR -1;
7)
I.e. Does not satisfy formula (4); in the case where the assumption is true, this does not occur.
Preferably, the key interception operation refers to intercepting the N low -bit key synchronization code of the N bit -bit key synchronization code.
Preferably, at call setup, the key distribution center distributes the key of the initial value to the sender and the receiver.
The system of the key synchronization method comprises a transmitting end and a receiving end;
The sending end is used for adding N bit bits of time synchronization information into unencrypted data as a key synchronization code and forming a data frame with the unencrypted data; according to the key synchronous code, the encryption module encrypts the unencrypted data by using the corresponding key; performing key interception operation on the N bit -bit key synchronous code, and forming the encrypted data and the truncated key synchronous code into air interface data of a transmitting end;
the receiving end uses the local time synchronization information to restore the truncated key synchronization code to the complete key synchronization code same as the sender; the decryption module decrypts the encrypted data using the corresponding key according to the key synchronization code algorithm.
Preferably, the key distribution center distributes the key of the initial value to the sender and the receiver at the time of call establishment.
Preferably, the key interception operation is specifically as follows: n low -bit key synchronization codes of the N bit -bit key synchronization codes are intercepted.
The beneficial effects of the invention are as follows:
The invention provides the decryption serial number transmission in a truncated mode for the receiving and transmitting parties on the narrow-band channel so as to realize the efficient transmission of data and correct encryption and decryption operation. By adding N bit bits of time synchronization information into unencrypted data as a key synchronization code, the key synchronization code has dynamic change, and the difficulty of decoding the key synchronization code is increased; the receiver recovers the truncated key synchronization code to the same complete synchronization code as the sender using the local time synchronization information. The method has the following main characteristics: the network side does not need encryption and decryption, and the whole ciphertext is transmitted; the required channel bandwidth is small, and the bit number of each frame for bearing the serial number is smaller than the bit length of the key synchronous code; the key information has timeliness and can resist replay attack; the serial number recovery requires that the time difference between the two parties is in a specific range, so that interception and decoding can be effectively resisted.
Drawings
Fig. 1 is a general process of prior art information encryption/decryption.
Fig. 2 is a prior art process of using a null frame number as a symmetric secret key synchronization code.
Fig. 3 is a process of the key synchronization method of the present invention.
Detailed Description
The invention is described in detail below with reference to the drawings and the detailed description.
Example 1
As shown in fig. 3, a key synchronization method includes the steps of:
S1: the sender reads the local time, adds N bit bits of time synchronization information into the unencrypted data as a key synchronization code, and forms a data frame with the unencrypted data;
s2: encrypting the unencrypted data by using the corresponding key according to the key synchronous code; performing key interception operation on the key synchronous code with N bit bits; in a specific embodiment, the key interception operation is to intercept the N low bit key synchronization code of the N bit bit key synchronization code.
S3: forming the encrypted data and the truncated key synchronous code into air interface data of a sender;
S4: the receiving party receives the air interface data, and recovers the truncated key synchronous code in the air interface data into the same key synchronous code as the sending party by utilizing the local time synchronous information;
s5: the receiving side decrypts the encrypted data with the corresponding key according to the key synchronization code algorithm.
In a specific embodiment, the data frame encrypted by the sender to the encryption module includes N bit bits of time synchronization information t T, where the N bit bits of time synchronization information t T indicates the time of encrypting the data frame, specifically:
tT=TfaT+TnfbT (1)
Wherein a T is the lower N low bits of N bit bits, the indicated time unit is the air interface frame period T f;bT is the upper (N bit-Nlow) bits of N bit bits, the indicated unit is Air interface frame period/>N low bits of the a T value are transmitted on the air interface and sent with the data frame to the receiver, and b T is not transmitted through the air interface.
In a specific embodiment, the receiver calculates a recovery b T by receiving a T and the time local to the time of receipt of the data frame; then t T with N bit bytes is obtained, and sequence synchronous decryption is carried out according to the obtained t T; wherein, the recovery algorithm of b T is as follows:
The time when the receiver receives the data frame is denoted by t R:
Wherein Δt T represents the transmission delay of the data frame; Δt e is the time difference between the transmitting and receiving sides (Δt e =0 if both communication sides belong to the same base station, otherwise Δt e≠0);aR、bR is the time when the receiving side receives the data frame, a R is the low N low bits of N bit bits, the time unit is T f,bR is the high (N bit-Nlow) bits of N bit bits, and the time unit is T nf.
In a specific embodiment, since b T is not transmitted in the air, the receiver can only make the speculation on b T, as follows: assume that
I.e. the sum of the transmission delay and the time difference between the transmitting and receiving parties is smaller than
It should be noted that, by reasonably selecting the values of N bit and N low, the formula (3) in engineering practice is easy to satisfy. The expression (2) and the expression (3) are as follows:
wherein a R、bR、aT、bT、Tf and T nf each represent a non-negative integer, and there is a constraint relationship:
Calculating the value of b T through the value range of T f(aR-aT). In a specific embodiment, for the range of values of T f(aR-aT), the following 7 cases are discussed:
1)Tf(aR-aT)=0
I.e., (a R-aT) =0, combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e., b T=bR;
this situation arises, indicating that the time difference between the communicating parties exactly cancels out the transmission delay.
2)
I.e.Combining formula (4) and formula (5) yields (b R-bT) = -1, i.e. b T=bR +1.
3)
I.e.Combining formula (4) and formula (5) yields (b R-bT) =0, i.e. b T=bR.
4)
I.e.Does not satisfy formula (4); in the case where the assumption is true, this does not occur.
5)
I.e.Combining formula (4) and formula (5) yields (b R-bT) =0, i.e. b T=bR.
6)
I.e.Combining formula (4) and formula (5) yields (b R-bT) =1, i.e. b T=bR -1.
7)
I.e.Does not satisfy formula (4); in the case where the assumption is true, this does not occur.
In a specific embodiment, when a call is established, a key distribution center distributes a key of an initial value for a sender and a receiver, N bit bits of time synchronization information is added into unencrypted data to serve as a dynamic key synchronization code in the subsequent call process, and each frame of data is transmitted in a secret manner by using the dynamic key synchronization code. The key synchronization method in this embodiment uses time synchronization information to transmit truncated key synchronization information, and reduces bandwidth requirements while reducing the probability of being deciphered.
Example 2
The system of a key synchronization method, the said sender, is used for adding N bit bit time synchronization information as the key synchronization code in the unencrypted data, and form the data frame with the unencrypted data; according to the key synchronous code, the encryption module encrypts the unencrypted data by using the corresponding key; performing key interception operation on the N bit -bit key synchronous code, and forming the encrypted data and the truncated key synchronous code into air interface data of a transmitting end;
The receiving end uses the local time synchronization information to restore the truncated key synchronization code to the complete key synchronization code same as the sender; the decryption module decrypts the encrypted data using the corresponding key according to the key synchronization code algorithm. In one specific embodiment of the present invention,
The data frame encrypted by the encryption module sent by the sending end contains N bit bits of time synchronization information t T, and the N bit bits of time synchronization information t T represents the time of encrypting the data frame, specifically:
tT=TfaT+TnfbT (1)
Wherein a T is the lower N low bits of N bit bits, the indicated time unit is the air interface frame period T f;bT is the upper (N bit-Nlow) bits of N bit bits, the indicated unit is Air interface frame period/>N low bits of a T are transmitted on the air interface, and are sent to the receiving end along with the data frame, and b T is not transmitted through the air interface.
In a specific embodiment, the receiving end calculates and restores b T through the received a T and the local time at the time of receiving the data frame; then t T with N bit bytes is obtained, and sequence synchronous decryption is carried out according to the obtained t T; wherein, the recovery algorithm of b T is as follows:
The time when the receiving end receives the data frame is denoted by t R:
Wherein Δt T represents the transmission delay of the data frame; Δt e is the time difference between the transmitting and receiving sides (Δt e =0 if both communication sides belong to the same base station, otherwise Δt e≠0);aR、bR is the time when the receiving side receives the data frame, a R is the low N low bits of N bit bits, the time unit is T f,bR is the high (N bit-Nlow) bits of N bit bits, and the time unit is T nf.
In a specific embodiment, the receiving end performs the following speculation on b T: assume that
I.e. the sum of the transmission delay and the time difference between the transmitting and receiving parties is smaller than
Expressed by the following formula (2) and formula (3)
Wherein a R、bR、aT、bT、Tf and T nf each represent a non-negative integer, and there is a constraint relationship:
Calculating the value of b T through the value range of T f(aR-aT).
In a specific embodiment, the key interception operation is specifically as follows: n low -bit key synchronization codes of the N bit -bit key synchronization codes are intercepted.
In a specific embodiment, when a call is established, a key distribution center distributes a key of an initial value for a sender and a receiver, N bit bits of time synchronization information is added into unencrypted data to serve as a dynamic key synchronization code in the subsequent call process, and each frame of data is transmitted in a secret manner by using the dynamic key synchronization code. The key synchronization method in this embodiment uses time synchronization information to transmit truncated key synchronization information, and reduces bandwidth requirements while reducing the probability of being deciphered.
Example 3
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method steps of:
S1: the sender adds N bit bits of time synchronization information into the unencrypted data as a key synchronization code, and forms a data frame with the unencrypted data;
S2: encrypting the unencrypted data according to the key synchronization code; performing key interception operation on the key synchronous code with N bit bits;
s3: forming the encrypted data and the truncated key synchronous code into air interface data of a sender;
S4: the receiving party receives the air interface data, and recovers the truncated key synchronous code in the air interface data into the same key synchronous code as the sending party by utilizing the local time synchronous information;
S5: the receiving side decrypts the encrypted data according to the key synchronization code algorithm.
It is to be understood that the above examples of the present invention are provided by way of illustration only and not by way of limitation of the embodiments of the present invention. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the invention are desired to be protected by the following claims.

Claims (4)

1. A key synchronization method, characterized in that: the method comprises the following steps:
S1: the sender adds N bit bits of time synchronization information into the unencrypted data as a key synchronization code, and forms a data frame with the unencrypted data;
S2: encrypting the unencrypted data according to the key synchronization code; performing key interception operation on the key synchronous code with N bit bits;
s3: forming the encrypted data and the truncated key synchronous code into air interface data of a sender;
S4: the receiving party receives the air interface data, and recovers the truncated key synchronous code in the air interface data into the same key synchronous code as the sending party by utilizing the local time synchronous information;
s5: the receiving party decrypts the encrypted data according to the key synchronous code algorithm;
The N bit bit time synchronization information t T indicates the time of data frame encryption, specifically:
tT=TfaT+TnfbT (1)
Wherein a T is the lower N low bits of N bit bits, the indicated time unit is the air interface frame period T f;bT is the upper (Nbit-Nlow) bits of Nbit, and the indicated unit is Air interface frame period/>N low bits of a T value are transmitted on an air interface and are sent to a receiver along with a data frame, and b T is not transmitted through the air interface;
The receiver calculates and restores b T through the received a T and the local time at the time of receiving the data frame; then t T with N bit bytes is obtained, and sequence synchronous decryption is carried out according to the obtained t T; wherein, the recovery algorithm of b T is as follows:
The time when the receiver receives the data frame is denoted by t R:
Wherein Δt T represents the transmission delay of the data frame; Δt e is the time difference between the transmitting and receiving parties; a R、bR is the time when the receiving side receives the data frame, a R is the low N low bits of N bit bits, the indicated time unit is T f,bR is the high (Nbit-Nlow) bits of Nbit bits, and the indicated time unit is T nf;
Since b T is not transmitted in the air interface, the receiver can only speculate about b T, specifically as follows: assume that
I.e. the sum of the transmission delay and the time difference between the transmitting and receiving parties is smaller than
Expressed by the following formula (2) and formula (3)
Wherein a R、bR、aT、bT、Tf and T nf each represent a non-negative integer, and there is a constraint relationship:
Calculating the value of b T through the value range of T f(aR-aT);
For the range of values of T f(aR-aT), the following 7 cases are discussed:
1)Tf(aR-aT)=0
I.e., (a R-aT) =0, combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e., b T=bR;
this situation arises, indicating that the time difference between the two communicating parties exactly counteracts the transmission delay;
2)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) = -1, i.e. b T=bR +1;
3)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e. b T=bR;
4)
I.e. Does not satisfy formula (4); in the case where the assumption is true, this does not occur;
5)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e. b T=bR;
6)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =1, i.e. b T=bR -1;
7)
I.e. Does not satisfy formula (4); in the case where the assumption is true, this does not occur;
the key interception operation refers to intercepting the N low -bit key synchronous code of the N bit -bit key synchronous code.
2. The key synchronization method according to claim 1, wherein: when a call is established, a key distribution center distributes keys of initial values to a sender and a receiver.
3. Key synchronization system applying a key synchronization method according to any of the claims 1-2, characterized in that: the system comprises a transmitting end and a receiving end;
The sending end is used for adding N bit bits of time synchronization information into unencrypted data as a key synchronization code and forming a data frame with the unencrypted data; according to the key synchronous code, the encryption module encrypts the unencrypted data by using the corresponding key; performing key interception operation on the N bit -bit key synchronous code, and forming the encrypted data and the truncated key synchronous code into air interface data of a transmitting end;
the receiving end uses the local time synchronization information to restore the truncated key synchronization code to the complete key synchronization code same as the sender; according to the key synchronous code algorithm, the decryption module decrypts the encrypted data by using the corresponding key;
The N bit bit time synchronization information t T indicates the time of data frame encryption, specifically:
tT=TfaT+TnfbT (1)
Wherein a T is the lower N low bits of N bit bits, the indicated time unit is the air interface frame period T f;bT is the upper (Nbit-Nlow) bits of Nbit, and the indicated unit is Air interface frame period/>N low bits of a T value are transmitted on an air interface and are sent to a receiver along with a data frame, and b T is not transmitted through the air interface;
The receiver calculates and restores b T through the received a T and the local time at the time of receiving the data frame; then t T with N bit bytes is obtained, and sequence synchronous decryption is carried out according to the obtained t T; wherein, the recovery algorithm of b T is as follows:
The time when the receiver receives the data frame is denoted by t R:
Wherein Δt T represents the transmission delay of the data frame; Δt e is the time difference between the transmitting and receiving parties; a R、bR is the time when the receiving side receives the data frame, a R is the low N low bits of N bit bits, the indicated time unit is T f,bR is the high (Nbit-Nlow) bits of Nbit bits, and the indicated time unit is T nf;
Since b T is not transmitted in the air interface, the receiver can only speculate about b T, specifically as follows: assume that
I.e. the sum of the transmission delay and the time difference between the transmitting and receiving parties is smaller than
Expressed by the following formula (2) and formula (3)
Wherein a R、bR、aT、bT、Tf and T nf each represent a non-negative integer, and there is a constraint relationship:
Calculating the value of b T through the value range of T f(aR-aT);
For the range of values of T f(aR-aT), the following 7 cases are discussed:
1)Tf(aR-aT)=0
I.e., (a R-aT) =0, combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e., b T=bR;
this situation arises, indicating that the time difference between the two communicating parties exactly counteracts the transmission delay;
2)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) = -1, i.e. b T=bR +1;
3)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e. b T=bR;
4)
I.e. Does not satisfy formula (4); in the case where the assumption is true, this does not occur;
5)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =0, i.e. b T=bR;
6)
I.e. Combining formula (4) and formula (5) to obtain (b R-bT) =1, i.e. b T=bR -1;
7)
I.e. Does not satisfy formula (4); in the case where the assumption is true, this does not occur;
the key interception operation refers to intercepting the N low -bit key synchronous code of the N bit -bit key synchronous code.
4. A key synchronization system according to claim 3, characterized in that: when a call is established, a key distribution center distributes keys of initial values to a sending end and a receiving end.
CN202210271300.8A 2022-03-18 2022-03-18 Key synchronization method and system Active CN114760051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210271300.8A CN114760051B (en) 2022-03-18 2022-03-18 Key synchronization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210271300.8A CN114760051B (en) 2022-03-18 2022-03-18 Key synchronization method and system

Publications (2)

Publication Number Publication Date
CN114760051A CN114760051A (en) 2022-07-15
CN114760051B true CN114760051B (en) 2024-06-14

Family

ID=82328190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210271300.8A Active CN114760051B (en) 2022-03-18 2022-03-18 Key synchronization method and system

Country Status (1)

Country Link
CN (1) CN114760051B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103986583A (en) * 2014-05-29 2014-08-13 上海斐讯数据通信技术有限公司 Dynamic encryption method and encryption communication system thereof
CN111835509A (en) * 2020-05-20 2020-10-27 成都盛拓源科技有限公司 Anti-loss one-way encryption method and device based on hash function and password

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103986583A (en) * 2014-05-29 2014-08-13 上海斐讯数据通信技术有限公司 Dynamic encryption method and encryption communication system thereof
CN111835509A (en) * 2020-05-20 2020-10-27 成都盛拓源科技有限公司 Anti-loss one-way encryption method and device based on hash function and password

Also Published As

Publication number Publication date
CN114760051A (en) 2022-07-15

Similar Documents

Publication Publication Date Title
CN111416706B (en) Quantum secret communication system based on secret sharing and communication method thereof
CN102088441B (en) Data encryption transmission method and system for message-oriented middleware
CN105376261B (en) Encryption method and system for instant messaging message
CN101217362A (en) RFID communication security mechanism established based on dynamic randomization DRNTRU public key encryption system
CN101103586A (en) Apparatus and method for ciphering/deciphering a signal in acommunication system
CN116321129B (en) Lightweight dynamic key-based power transaction private network communication encryption method
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN106533656A (en) Key multilayer mixed encryption/decryption method based on WSN
US20020199102A1 (en) Method and apparatus for establishing a shared cryptographic key between energy-limited nodes in a network
CN107666491B (en) Data transmission method of air-ground integrated network based on symmetric encryption
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN103167494A (en) Information sending method and information sending system
CN111385088B (en) Efficient satellite quantum key pairing generation method
CN111555879B (en) Satellite communication network management channel message encryption and decryption method and system
CN114362928A (en) Quantum key distribution and reconstruction method for multi-node encryption
EP2380304A1 (en) Method of encryption in networked embedded systems
CN114760051B (en) Key synchronization method and system
CN104579645B (en) Key updating method based on AES encryption system
CN107888611B (en) Communication method and device
CN109462480A (en) Satellite communication system encryption method based on RSA and AES
CN111885013B (en) Mimicry encryption communication module, system and method
US8036383B2 (en) Method and apparatus for secure communication between cryptographic systems using real time clock
CN113596054A (en) Information intersystem transmission soft frequency hopping encryption method
EP1456997A1 (en) System and method for symmetrical cryptography
US20240031144A1 (en) Method for protecting payload data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant