CN115001758B - Quantum encryption-based short byte message security encryption method - Google Patents
Quantum encryption-based short byte message security encryption method Download PDFInfo
- Publication number
- CN115001758B CN115001758B CN202210543145.0A CN202210543145A CN115001758B CN 115001758 B CN115001758 B CN 115001758B CN 202210543145 A CN202210543145 A CN 202210543145A CN 115001758 B CN115001758 B CN 115001758B
- Authority
- CN
- China
- Prior art keywords
- message
- data
- length
- preset
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 10
- 238000013507 mapping Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a short byte message safety encryption method based on quantum encryption, which comprises the steps of judging the length of a message, and regarding the message as a short byte message under the condition that the length of the message is smaller than a preset length, randomly selecting a filling algorithm to expand the message into a pseudo message with a designated length, carrying out quantum encryption after the length of the pseudo message is expanded, namely carrying out quantum encryption on the message which becomes a long byte, wherein the long byte message can avoid the problem that ciphertext formed after the quantum encryption of the short byte message is easy to be associatively identified, thereby improving the encryption safety of plaintext data.
Description
Technical Field
The invention relates to the technical field of quantum security, in particular to a short byte message security encryption method based on quantum encryption.
Background
The rapid development of the Internet makes the life of people more convenient and smoother, and the communication with the outside world is more and smoother, and people can transmit various files through the network, realize dialogue communication and the like. With the rapid development of computer networks, many information hidden dangers, especially information security problems, are brought about at the same time, and the problems have been existed from the birth of computer networks, and people are researching various encryption technologies to improve the security of information transmission.
Encryption is to convert data into ciphertext which cannot be read by anyone without a correct key through cryptographic arithmetic, and in order to read ciphertext, the ciphertext must be converted into its original form: a plaintext; while a double cipher containing a key for mathematically converting the ciphertext is a key. In the case of key encryption, even if a piece of information is intercepted, the information cannot be read.
With the advent of quantum computers with subversion improvements in computation speed, quantum encryption has become a new and unique way of secure encryption that can resist quantum computing attacks. The quantum encryption adopts a one-time encryption mode based on a quantum network, so that encrypted ciphertext cannot be theoretically decrypted through dynamic change of a secret key; however, since the length of the ciphertext after quantum encryption is consistent with the length of the plaintext and the quantum key is a true random number, if the plaintext is a very short message, the formed ciphertext is too short, and if the quantum key is just bumped into a section of all 0 or most 0 quantum key during quantum encryption, the obtained ciphertext is the same as most of the plaintext, even the ciphertext is the same as most of the plaintext, and the ciphertext is easy to be associatively identified. A long byte plaintext message can avoid such a problem, but is very fatal for a short byte plaintext message.
Disclosure of Invention
The invention aims to: the invention aims to provide a short byte message security encryption method based on quantum encryption, which solves the problems that the probability of identifying ciphertext encrypted by the short byte message in the existing quantum encryption is very high and the security is not enough. The invention effectively makes up the defect of quantum encryption in short-byte message encryption, adopts short-byte message data to be expanded into pseudo-message data with appointed length, and then carries out quantum encryption on the pseudo-message data, thereby effectively solving the disadvantage of quantum encryption in short-byte message encryption and further improving the security of quantum encryption.
The technical scheme is as follows: the invention provides a short byte message security encryption method based on quantum encryption, which comprises the following steps:
(1) The sender and the receiver are both provided with the same preset filling algorithm, and a mapping table for mutually mapping the data identification and the filling algorithm is established; the sender and the receiver also share a group of key strings;
(2) The sender judges the length of the message to be sent, if the length of the message is greater than or equal to the preset length, a preset mark is added to the head of the message, the message with the added preset mark is subjected to quantum encryption through a shared key string to obtain a ciphertext, and the ciphertext is sent to the receiver; if the length of the message is smaller than the preset length, randomly selecting a filling algorithm to expand the message into a pseudo message with a designated length, adding a data identifier corresponding to the filling algorithm to the head of the pseudo message, carrying out quantum encryption on the pseudo message with the added data identifier through a shared key string to obtain a ciphertext, and sending the ciphertext to a receiver;
(3) After receiving the ciphertext, the receiver firstly decrypts the ciphertext by using the shared key string to obtain decrypted data, identifies the head of the decrypted data, and if the identified identification is a preset identification, the data of the decrypted data except the preset identification is final data; if the identified identifier is the data identifier, extracting a filling algorithm corresponding to the data identifier according to the mapping table, inputting the data except the data identifier of the decrypted data into the filling algorithm, and obtaining the data which is the final data; the final data is the message that the sender needs to send.
Further, the preset filling algorithm is one or more of a DES algorithm, a 3DES algorithm or an AES algorithm.
Further, the preset length is 128 bits, 64 bits or 256 bits.
Further, the length of the preset mark is the same as the length of the data mark.
Further, the length of the preset identifier and the length of the data identifier are both 2 bytes.
The invention has the beneficial effects that: the invention judges the length of the message, namely the message is regarded as a short byte message under the condition that the length of the message is smaller than the preset length, then randomly selects the filling algorithm to expand the message into the pseudo message with the appointed length, and performs quantum encryption after the length of the pseudo message is expanded, namely the message which is changed into a long byte is subjected to quantum encryption, and the long byte message can avoid the problem that ciphertext formed after the quantum encryption of the short byte message is easy to be associatively identified, thereby improving the encryption security of plaintext data.
Drawings
FIG. 1 is a schematic diagram of a plaintext header attachment identification structure;
fig. 2 is a flow chart of example 1 quantum cryptography.
Detailed Description
The invention is further described below with reference to the accompanying drawings and examples:
The quantum encryption technology is to obtain a quantum key in a one-time pad mode and then conduct exclusive-or operation on a plaintext message to obtain a final ciphertext, and for a plaintext message with a relatively long size, the ciphertext after quantum encryption is correspondingly long, the possibility of being identified is extremely low, but the plaintext message itself has uncertainty, the data length of the plaintext message cannot be ensured, and the ciphertext obtained by quantum encryption of a plaintext message with a short byte is also very short, so that the probability of being identified is very high. Because the quantum key is a true random number, a section for quantum encryption of a plaintext message of a short byte is just 0, so that the obtained ciphertext is identical to the plaintext message after exclusive-or operation, and the quantum encryption function is not realized; even if it is not exactly 0, the resulting ciphertext is not exactly the same as the plaintext message, but since the plaintext message itself is very short, there is a possibility that it is associatively recognized, for example: the ciphertext formed after quantum encryption of the short byte message is he, which is easily associatively referred to as hello. The probability of occurrence of the condition of short byte plaintext message transmission in practical application is not low, so the invention provides a short byte message security encryption method based on quantum encryption, which is used for solving the problem that ciphertext formed after the short byte message quantum encryption is easy to be associatively identified.
The invention discloses a short byte message security encryption method based on quantum encryption, which comprises the following steps:
(1) The sender and the receiver are both provided with the same preset filling algorithm, and a mapping table for mutually mapping the data identification and the filling algorithm is established; the preset filling algorithm is one or more of a DES algorithm, a 3DES algorithm or an AES algorithm, and can be other existing filling algorithms; and establishing a mapping table such as: 1 represents a DES algorithm, 2 represents a 3DES algorithm, 3 represents an AES algorithm, etc.; finally, the sender and the receiver also share a set of key strings, which are used for quantum encryption;
(2) The sender judges the length of the message to be sent so as to determine whether the message is a short byte message or a long byte message, the byte length standard of the message is not fixed, the message can be preset to be correspondingly adjusted according to the requirement, for example, the preset length is 128 bits, 64 bits or 256 bits, if the length of the message is greater than or equal to the preset length and is regarded as the long byte message, the preset identifier is added to the head of the message, the message with the added preset identifier is subjected to quantum encryption through a shared key string to obtain a ciphertext, and the ciphertext is sent to the receiver; if the length of the message is smaller than the preset length and is regarded as a short byte message, randomly selecting a filling algorithm to expand the message into a pseudo message with a specified length, wherein the specified length is as large as possible and is equal to the preset length, and the pseudo message is not easy to identify and associate as long as the fact that the pseudo message is satisfied; adding a data identifier corresponding to a filling algorithm to the head of the pseudo message, carrying out quantum encryption on the pseudo message with the added data identifier through a shared key string to obtain a ciphertext, and sending the ciphertext to a receiver;
As shown in fig. 1, the length of the preset identifier is the same as that of the data identifier, and the length of the preset identifier and the length of the data identifier are both 2 bytes, so that no matter the message is a long byte message or a short byte message, a 2-byte identifier needs to be added to the header of the message, and a receiver only needs to judge whether the 2-byte identifier added to the header is the preset identifier or the data identifier, so that whether the data is expanded or not can be known.
(3) After receiving the ciphertext, the receiver firstly decrypts the ciphertext by using the shared key string to obtain decrypted data, and identifies the head of the decrypted data, namely judges whether the identification of the head added with 2 bytes is a preset identification or a data identification, and if the identified identification is the preset identification, the data of the decrypted data except the preset identification is final data, namely the message to be sent by the sender; and if the identified identifier is the data identifier, extracting a filling algorithm corresponding to the data identifier according to the mapping table, inputting the data except the data identifier of the decrypted data into the filling algorithm for restoration, wherein the obtained data is final data, and the final data is a message to be sent by a sender.
Therefore, by judging the length of the message, the message is regarded as a short byte message under the condition that the length of the message is smaller than the preset length, the message is expanded into a pseudo message with the specified length by a random selection filling algorithm, the length of the pseudo message is expanded and then quantum encryption is carried out, namely the message which is changed into a long byte is subjected to quantum encryption, and the long byte message can avoid the problem that ciphertext formed after the quantum encryption of the short byte message is easy to be associatively identified, so that the encryption security of plaintext data is improved.
Example 1
Sender quantum encryption:
The sender and the receiver need to agree on a shared set of key strings first, and also agree on the same preset filling algorithm, for example: DES,3DES, aes algorithm, etc., and builds a mapping table, and ensures that the sender and the receiver have the same part of such mapping table, which is what data identifier represents what filling algorithm, for example: 1 represents DES algorithm, 2 represents 3DES algorithm, 3 represents AES algorithm, etc., and this data identification adds a length of 2 bytes to the header of the message;
After the sender generates the plaintext message to be sent, as shown in fig. 2, the length of the plaintext message needs to be determined first, so as to determine whether the plaintext message is a short byte message or a long byte message. The byte length standard of the plaintext message is not fixed, and can be correspondingly adjusted according to the application scene, and the preset length is 128 bits in this embodiment. A plaintext message is less than 128 bits as a short byte message and greater than 128 bits as a long byte message. Because the identifiable association possibility of the ciphertext after the short-byte message quantum encryption is higher, the short-byte message is expanded into a pseudo message with a specified length through a preset agreed filling algorithm, and the specified length is as large as 128 bits or more as possible, namely the short-byte message is transformed into an unidentifiable long-byte message. The invention takes 128 bits as an example, so that short byte messages smaller than 128 bits need to be converted into a new unidentifiable long byte plaintext message; while long byte messages do not need to be processed.
Whether the plaintext message to be sent is a long-byte message or a short-byte message, a 2-byte identifier is required to be added to the head of the plaintext message, and a preset identifier is added to the head of the plaintext message; the short byte message randomly selects a filling algorithm to expand the message into a pseudo message with a designated length, and adds a data identifier corresponding to the filling algorithm to the head of the pseudo message. The reason for this is: if the 2-byte identifier is not added, the receiver does not know whether the message transmitted by the sender is long-byte or short-byte, which results in that the receiver cannot determine whether to inversely transform the data, so that in order to ensure consistency and operability, whether the message is a long-byte message or a short-byte message, the 2-byte identifier needs to be added to the header of the message. The preset identifier may be: 0, indicating that no algorithm is used, no transformation is required; and the data identification may be: 1 represents a DES algorithm, 2 represents a 3DES algorithm, 3 represents an AES algorithm, and the like.
Then carrying out quantum encryption on the long byte message with the preset identifier through a shared key string to obtain a ciphertext, and sending the ciphertext to a receiver; or carrying out quantum encryption on the pseudo message with the added data identifier through a shared key string to obtain a ciphertext, and sending the ciphertext to a receiver;
and (5) quantum decryption at a receiving party:
After receiving the ciphertext, the receiver firstly decrypts the ciphertext by using the shared key string to obtain decrypted data, and marks the unprocessed decrypted data as C1;
at this time, the header of C1 is attached with 2 bytes of identification information, the receiver needs to intercept the 2 bytes of identification information of the header first, and the decrypted data left after interception is marked as C2. After reading the 2-byte identification information, the next operation is determined according to the content of the identification information.
If the identification information is a preset identification, no transformation is performed, and an algorithm is not needed, namely the message is originally a long-byte message, and C2 is the message which needs to be sent by the sender; if the identification information is the data identification, extracting a filling algorithm corresponding to the data identification according to the mapping table, and restoring the C2 input filling algorithm, wherein the obtained data is final data, and the final data is a message to be sent by a sender. So far, the receiver has acquired the message of the sender.
Claims (1)
1. A method for secure encryption of a short byte message based on quantum encryption, the method comprising the steps of:
(1) The sender and the receiver are both provided with the same preset filling algorithm, and a mapping table for mutually mapping the data identification and the filling algorithm is established; the sender and the receiver also share a group of key strings;
(2) The sender judges the length of the message to be sent, if the length of the message is greater than or equal to the preset length, a preset mark is added to the head of the message, the message with the added preset mark is subjected to quantum encryption through a shared key string to obtain a ciphertext, and the ciphertext is sent to the receiver; if the length of the message is smaller than the preset length, randomly selecting a filling algorithm to expand the message into a pseudo message with a designated length, adding a data identifier corresponding to the filling algorithm to the head of the pseudo message, carrying out quantum encryption on the pseudo message with the added data identifier through a shared key string to obtain a ciphertext, and sending the ciphertext to a receiver;
(3) After receiving the ciphertext, the receiver firstly decrypts the ciphertext by using the shared key string to obtain decrypted data, identifies the head of the decrypted data, and if the identified identification is a preset identification, the data of the decrypted data except the preset identification is final data; if the identified identifier is the data identifier, extracting a filling algorithm corresponding to the data identifier according to the mapping table, inputting the data except the data identifier of the decrypted data into the filling algorithm, and obtaining the data which is the final data; the final data is the information which needs to be sent by the sender;
wherein, the preset filling algorithm is one or more of DES algorithm, 3DES algorithm or AES algorithm;
The preset length is 128 bits, 64 bits or 256 bits;
The length of the preset mark is the same as that of the data mark;
the specified length is greater than or equal to a preset length;
The length of the preset mark and the length of the data mark are both 2 bytes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210543145.0A CN115001758B (en) | 2022-05-18 | 2022-05-18 | Quantum encryption-based short byte message security encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210543145.0A CN115001758B (en) | 2022-05-18 | 2022-05-18 | Quantum encryption-based short byte message security encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115001758A CN115001758A (en) | 2022-09-02 |
CN115001758B true CN115001758B (en) | 2024-05-07 |
Family
ID=83027380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210543145.0A Active CN115001758B (en) | 2022-05-18 | 2022-05-18 | Quantum encryption-based short byte message security encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115001758B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116232762B (en) * | 2023-05-05 | 2023-08-01 | 广东广宇科技发展有限公司 | Encryption data transmission method based on quantum key |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9614668B1 (en) * | 2016-09-14 | 2017-04-04 | ISARA Corporation | Conversion schemes for cryptography systems |
CN106789053A (en) * | 2016-12-13 | 2017-05-31 | 四川长虹电器股份有限公司 | Random ciphertext generation method and system, decryption method and system |
CN108390860A (en) * | 2018-01-24 | 2018-08-10 | 北京奇艺世纪科技有限公司 | A kind of encryption and decryption method and device of data packet |
CN109756326A (en) * | 2017-11-07 | 2019-05-14 | 中兴通讯股份有限公司 | Quantum encryption communication method, equipment and computer readable storage medium |
KR20200067265A (en) * | 2018-09-07 | 2020-06-12 | 고려대학교 산학협력단 | Apparatus and Method for Patterned Cipher Block for Real-Time Data Communication |
US11115184B2 (en) * | 2017-05-22 | 2021-09-07 | Micro Focus Llc | Format preserving encryption with padding |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9450749B2 (en) * | 2000-03-29 | 2016-09-20 | Wolfgang S. Hammersmith | One-time-pad encryption with central key service |
WO2012131856A1 (en) * | 2011-03-25 | 2012-10-04 | 富士通株式会社 | Information processing device, tampering detection device, information processing method, tampering detection method, information processing program, and tampering detection program |
-
2022
- 2022-05-18 CN CN202210543145.0A patent/CN115001758B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9614668B1 (en) * | 2016-09-14 | 2017-04-04 | ISARA Corporation | Conversion schemes for cryptography systems |
CN106789053A (en) * | 2016-12-13 | 2017-05-31 | 四川长虹电器股份有限公司 | Random ciphertext generation method and system, decryption method and system |
US11115184B2 (en) * | 2017-05-22 | 2021-09-07 | Micro Focus Llc | Format preserving encryption with padding |
CN109756326A (en) * | 2017-11-07 | 2019-05-14 | 中兴通讯股份有限公司 | Quantum encryption communication method, equipment and computer readable storage medium |
CN108390860A (en) * | 2018-01-24 | 2018-08-10 | 北京奇艺世纪科技有限公司 | A kind of encryption and decryption method and device of data packet |
KR20200067265A (en) * | 2018-09-07 | 2020-06-12 | 고려대학교 산학협력단 | Apparatus and Method for Patterned Cipher Block for Real-Time Data Communication |
Also Published As
Publication number | Publication date |
---|---|
CN115001758A (en) | 2022-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7305548B2 (en) | Using atomic messaging to increase the security of transferring data across a network | |
US20080137837A1 (en) | Encryption method for message authentication | |
CN105376261B (en) | Encryption method and system for instant messaging message | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
US7894608B2 (en) | Secure approach to send data from one system to another | |
CN112165443A (en) | Multi-key information encryption and decryption method and device and storage medium | |
CN112929166B (en) | Master station, slave station and data transmission system based on Modbus-TCP protocol | |
CN117278324B (en) | Message encryption transmission method and system | |
CN114499857B (en) | Method for realizing data correctness and consistency in encryption and decryption of large data quanta | |
CN115001758B (en) | Quantum encryption-based short byte message security encryption method | |
CN112948867A (en) | Method and device for generating and decrypting encrypted message and electronic equipment | |
CN112738037B (en) | Data encryption communication method | |
CN113965382A (en) | Tamper-proof method for bidding supervision list data encryption algorithm | |
CN116707778A (en) | Data hybrid encryption transmission method and device and electronic equipment | |
CN112637442B (en) | Method and device for encrypting circulating images by cloud server and local end | |
CN114978711A (en) | Data transmission method and system for symmetric encryption of dynamic secret key | |
CN114615054A (en) | Dynamic encryption transmission method based on code table | |
JP2005114870A (en) | Cryptocommunication system | |
CN113852456A (en) | Image encryption system based on Matlab chaotic mapping and feature extraction | |
CN112788046A (en) | Method and system for encrypting transmission information | |
CN112069472A (en) | User login authentication method and system | |
CN111131158A (en) | Single byte symmetric encryption and decryption method, device and readable medium | |
Dodeja | BaatCheet: Android chat application coupling End-to-End encryption and LSB substitution | |
CN112333204B (en) | 5G network transmission security device based on TCP IP protocol disorder feature code | |
CN114978699B (en) | Data encryption and data decryption methods, devices, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |