CN205812031U - The secrecy remotely controlled for Internet of Things controls device - Google Patents
The secrecy remotely controlled for Internet of Things controls device Download PDFInfo
- Publication number
- CN205812031U CN205812031U CN201620708389.XU CN201620708389U CN205812031U CN 205812031 U CN205812031 U CN 205812031U CN 201620708389 U CN201620708389 U CN 201620708389U CN 205812031 U CN205812031 U CN 205812031U
- Authority
- CN
- China
- Prior art keywords
- key
- circuit
- time pad
- encryption
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Small-Scale Networks (AREA)
Abstract
A kind of secrecy remotely controlled for Internet of Things controls device, using key sequence different storage positions in memory as bright key, carries out synchronized update after every time to instruction cryptographic operation, and as a part for ciphertext instruction;When receiving circuit and being decrypted, first read the bright key in ciphertext instruction and obtain the storage position of key, then read key and ciphertext instruction is decrypted.This utility model is by utilizing quantum true random number, the most reliable true random number cipher key source, in conjunction with one-time pad AES, it is possible to achieve telesecurity based on said system exploitation controls, and the secrecy realizing being perfectly safe between Internet of Things remote wireless communication device controls.
Description
Technical field
The utility model relates to the technology that between a kind of internet of things equipment, wireless encryption controls, specifically a kind of based on amount
Sub-random number, in combination with the long-distance safety controller of one-time pad AES.
Background technology
Remote control technology important component part in control field, is generally divided into wired remote control and wireless remote
Control.The wireless mode used between internet of things equipment sends and controls have bigger being ravesdropping compared to traditional wired mode
The danger even distorted, but the most mainly by using the plain-text instructions without encryption in a lot of control system.Past
100 years in cryptography quickly grow, contemporary cryptology is broadly divided into two classes: a class is symmetric cryptosystem, another kind of right and wrong
Symmetric cryptosystem.Conventional asymmetric cryptographic algorithm has RSA, Merkler Hellman, ELGamal, Rabin etc..Commonly use
Symmetric cryptosystem has DES, AES, RC5 etc..One-time pad belongs to symmetry cipher, is the one preferably side of encryption
Case, theoretically, uses the system of one-time pad algorithm for encryption to decode.One-time pad AES is mainly used in
Sensitive low bandwidth channel, is used for secrecy top secret file by the military and government very early.One-time pad algorithm requirement
Key is true random number, and the most usually utilizes computer to produce pseudo random number according to special algorithm, and pseudo random number is through foot
Can produce sequence after the enough long time to repeat, this point limits one-time pad and widely answers at the aspect such as civilian and commercial
With.Nowadays along with the development of modern quantum techniques, we can utilize quantum-mechanical uncertainty principle true to obtain quantum
Random number, the quantum real random number generator of the most day by day commercialization makes one-time pad algorithm have bigger application prospect.
Utility model content
This utility model cannot be applied to Internet of Things for existing quantum accidental enciphering technology, and action and instruction is same
Step property is difficult to meet the defects such as requirement, proposes a kind of secrecy remotely controlled for Internet of Things and controls device, deposits in hardware
Storage and management key, by utilizing quantum true random number, true random number cipher key source i.e. reliably, calculate in conjunction with one-time pad encryption
Method, it is possible to achieve telesecurity based on said system exploitation controls, and realizes absolutely between Internet of Things remote wireless communication device
The secrecy of safety is controlled.
This utility model is achieved through the following technical solutions:
This utility model includes: key generator circuitry, key management circuit, encryption transtation mission circuit and receiving and deciphering electricity
Road, wherein: key generator circuitry is connected with key management circuit and transmits key information, and key management circuit sends electricity with encryption
Road is connected and carries out one-time pad cryptographic operation, and key management circuit is connected with receiving and deciphering circuit and carries out one-time pad deciphering behaviour
Making, ciphertext transtation mission circuit receives circuit and is connected and transmits ciphertext instruction with ciphertext.
Described key management circuit includes: embedded controller and crypto key memory, wherein: embedded controller is with close
Key memorizer is connected and transmits key information.
Described encryption transtation mission circuit includes: one-time pad encryption equipment, synchronizing address manager and wireless transmitter, its
In: one-time pad encryption equipment is connected with synchronizing address manager and transmits key information, one-time pad encryption equipment and wireless transmit
Device is connected and sends ciphertext instruction.
Described receiving and deciphering circuit includes: one-time pad decipher, synchronizing address manager and wireless receiver, its
In: one-time pad decipher is connected with synchronizing address manager and transmits key information, one-time pad decipher and wireless receiving
Device is connected and the instruction of receiving and deciphering ciphertext.
Technique effect
Compared with prior art, this utility model, by being separated with communication equipment by true Random Number Generator, devises close
Key storage, manager and communication protocol, it is achieved control end and the encryption of long-range actuating station, the synchronization of deciphering;Next, in order to ensure
Being perfectly safe of key, this utility model devises key storage and renovator in the way of hardware, it is to avoid key exposure;?
After, this utility model employing one-time pad AES ensure that ciphertext instruction is theoretic and can not decode completely.Therefore, this is remote
Process control scheme is perfectly safe.
Accompanying drawing explanation
Fig. 1 is internet of things equipment encryption control system structure chart in embodiment 1;
Fig. 2 is remote control transtation mission circuit order structure figure in embodiment 1 (as a example by unmanned aerial vehicle (UAV) control instructs);
Fig. 3 is to receive circuit order structure figure (as a example by unmanned aerial vehicle (UAV) control instructs) in embodiment 1;
Fig. 4 is the plaintext and ciphertext data waveform intercepted and captured.
Detailed description of the invention
Embodiment 1
As it is shown in figure 1, the present embodiment relates to a kind of security control system being applied to UAS, including: quantum with
The instruction of machine generative circuit, key management circuit, unmanned plane performs to receive circuit and unmanned plane instruction issue circuitry, wherein: amount
Sub-random number generation circuit is connected with key management circuit and transmits key information, and key management circuit sends with unmanned plane instruction
Circuit is connected and carries out one-time pad encryption, and key management circuit is connected with unmanned plane command reception circuit and carries out one-time pad
Deciphering, unmanned plane instruction issue circuitry and unmanned plane instruction perform receive circuit wireless connections and transmit ciphertext instruction.
The present embodiment relates to the method for controlling security of said system, comprises the following steps:
Supplementing and renewal of step 1. key: detection unmanned plane instruction performs to receive circuit and unmanned plane instruction issue circuitry
Key storage circuitry in whether remain with enough random number key information, when do not have enough keys or need the most more Xinmi City
During key, by quantum stochastic generation circuit evolving random number key data, it is saved in External memory equipment such as SD card, by close
The key supplementary circuitry of key management circuit, successively is written to outside the Flash of transmission and reception circuit deposit by a key file
In storage chip, ensure that the random number in encryption, decrypting end chip is identical with this.When existing enough in Flash external memory chip
Key, then skip step 1 and directly carry out step 2;
The encryption of step 2. information and transmission: after unmanned plane instruction issue circuitry equipment starts, then the last time preserves
From the beginning of current key address (if using first, then from initial address 0x000000), store core from the Flash of key management circuit
Sheet reads fixing M key, is saved in buffer area, is divided into N group so that the key length often organized is more than or equal to plain-text instructions
Length.Taking the 1st group key byte and command byte, step-by-step carries out XOR and obtains ciphertext.By attached to starting position and the group of key
Being added to the tail portion of ciphertext instruction, order structure such as Fig. 2, a [27] a [29] in Fig. 2 is key starting position, a [30] a
[31] it is group.Ciphertext instruction after encryption is sent by the wireless transmitter finally by unmanned plane instruction issue circuitry.
Meanwhile, if the one-time pad encryption equipment of unmanned plane instruction issue circuitry starts creates error code when reading key, causing cannot be just
Really encryption or deciphering, one-time pad encryption equipment will re-start stressed key and re-encrypted, transmission automatically.
The reception of step 3. information and deciphering: when the wireless receiver of unmanned plane instruction execution reception circuit receives remote control
During instruction, first read the key storage address at instruction end, take out corresponding secret key byte according to address, decipher at one-time pad
Carry out XOR obtain in plain text, finally identifying the implication of plain-text instructions with plain-text instructions byte step-by-step under device controls, perform corresponding
Task, send receive answer signal, instruction results such as Fig. 3.Meanwhile, if unmanned plane instruction performs to receive circuit reading key
Creating error code, cause cannot correctly encrypting or deciphering, one-time pad decipher will re-start stressed key and weight automatically
New deciphering.
Described random number key data, when each encrypted instruction, consume identical length according to the length of required encrypted instruction
The key of degree.Specific implementation is: the command length every time encrypted added up, and this information determines used key next time
Original position, thus realize the most used key will be no longer used next time.
Described key length M value needs moderate, unsuitable excessive, spending the time oversize in order to avoid reading key, causing nothing
Instruction is sent by method in time;Unsuitable too small, excessively to exempt to read continually Flash memory chip, shorten Flash and store core
The sheet life-span.
Described key service condition information includes a shaping array, is stored in opening of Flash chip address space
Head part, is used for recording user and uses key length, i.e. current key position in the past, and this information only comprises the use feelings of key
Condition, and do not comprise any concrete key information, individualism the most in all senses, does not affect the safety of system.
Described system key service condition information when first operation is: 0x000000, every time before encryption, first from synchronization
Address manager reads key service condition information, and maps that to a variable for the position of control key reading
X, when consuming M key, after i.e. having encrypted the instruction of a length of M, performs X=X+M, i.e. updates X value and make as new key
Use situation information content, and be newly stored into key management circuit.
Compared with prior art, the present embodiment uses the true random number produced by quantum random number generator, and
Having generating random number speed faster, each key only uses once, it is achieved that real one-time pad unmanned plane is remotely pacified
Full control.Encryption, decipherment algorithm that this method uses are all step-by-step operations, and it is fast that processor performs speed, it is possible to achieve refers in real time
Order transmission, controls the most in real time.Therefore, the peace of unmanned plane can be conveniently realized based on telesecurity control system of the present utility model
The close control of all risk insurance.
In order to verify the reliability of encrypted instruction, intercept and capture remote controller respectively with the circuit with NRF24L01 radio-circuit and send out
It is mapped to aerial plaintext, ciphertext electromagnetic wave director data, stores data in SD card, carry out at data with Matlab software
Reason.Finally can obtain waveform as shown in Figure 4.As can be seen here, the plaintext before encryption has obvious periodicity, and the ciphertext after encryption is miscellaneous
Disorderly without chapter.
Above-mentioned be embodied as can by those skilled in the art on the premise of without departing substantially from this utility model principle and objective with
Different modes carries out local directed complete set to it, protection domain of the present utility model be as the criterion with claims and not by above-mentioned specifically
Implementing to be limited, each implementation in the range of it is all by the constraint of this utility model.
Claims (3)
1. the secrecy remotely controlled for Internet of Things controls device, it is characterised in that including: key generator circuitry, key
Management circuit, encryption transtation mission circuit and receiving and deciphering circuit, wherein: key generator circuitry is connected with key management circuit, close
Key management circuit is connected with encryption transtation mission circuit, and key management circuit is connected with receiving and deciphering circuit, and ciphertext transtation mission circuit is with close
Literary composition receives circuit and is connected;
Described key management circuit includes: embedded controller and crypto key memory, wherein: embedded controller is deposited with key
Reservoir is connected.
Device the most according to claim 1, is characterized in that, described encryption transtation mission circuit includes: one-time pad encryption equipment,
Synchronizing address manager and wireless transmitter, wherein: one-time pad encryption equipment is connected with synchronizing address manager, one-time pad
Encryption equipment is connected with wireless transmitter.
Device the most according to claim 1, is characterized in that, described receiving and deciphering circuit includes: one-time pad decipher,
Synchronizing address manager and wireless receiver, wherein: one-time pad decipher is connected with synchronizing address manager, one-time pad
Decipher is connected with wireless receiver.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620708389.XU CN205812031U (en) | 2016-07-07 | 2016-07-07 | The secrecy remotely controlled for Internet of Things controls device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620708389.XU CN205812031U (en) | 2016-07-07 | 2016-07-07 | The secrecy remotely controlled for Internet of Things controls device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205812031U true CN205812031U (en) | 2016-12-14 |
Family
ID=58140920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620708389.XU Active CN205812031U (en) | 2016-07-07 | 2016-07-07 | The secrecy remotely controlled for Internet of Things controls device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205812031U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213257A (en) * | 2019-05-28 | 2019-09-06 | 中国电子科技集团公司第三十研究所 | High safety IP secret communication method based on truly random stream exclusive or encryption |
CN114584368A (en) * | 2022-03-02 | 2022-06-03 | 上海图灵智算量子科技有限公司 | Smart home secret communication system based on quantum true random number and control method |
-
2016
- 2016-07-07 CN CN201620708389.XU patent/CN205812031U/en active Active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110213257A (en) * | 2019-05-28 | 2019-09-06 | 中国电子科技集团公司第三十研究所 | High safety IP secret communication method based on truly random stream exclusive or encryption |
CN110213257B (en) * | 2019-05-28 | 2021-07-09 | 中国电子科技集团公司第三十研究所 | High-safety IP secret communication method based on true random stream exclusive or encryption |
CN114584368A (en) * | 2022-03-02 | 2022-06-03 | 上海图灵智算量子科技有限公司 | Smart home secret communication system based on quantum true random number and control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106209356A (en) | The privacy control method remotely controlled for Internet of Things and system | |
CN109040090B (en) | A kind of data ciphering method and device | |
KR102042739B1 (en) | Apparatus and method for communication using message history-based security key using blockchain | |
CN109257346B (en) | Concealed transmission system based on block chain | |
US20170085543A1 (en) | Apparatus and method for exchanging encryption key | |
CN104821944A (en) | Hybrid encrypted network data security method and system | |
US9898100B2 (en) | Authenticating stylus device | |
US8948397B2 (en) | Major management apparatus, authorized management apparatus, electronic apparatus for delegated key management, and key management methods thereof | |
CN103685323A (en) | Method for realizing intelligent home security networking based on intelligent cloud television gateway | |
CN116318657A (en) | Relay key transmission method | |
CN107483192A (en) | A kind of data transmission method and device based on quantum communication | |
CN104424446A (en) | Safety verification and transmission method and system | |
CN102377571A (en) | Method and system for implementing IEC104 message transmission | |
CN103248476A (en) | Data encryption key management method, system and terminal | |
CN113542428B (en) | Vehicle data uploading method and device, vehicle, system and storage medium | |
CN103117850B (en) | A kind of method for building up of the cryptographic system based on random sequence database | |
CN205812031U (en) | The secrecy remotely controlled for Internet of Things controls device | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
CN105634884B (en) | A kind of control instruction wiring method, intelligent home furnishing control method and relevant apparatus | |
CN105553670A (en) | Cloud electronic signature authentication method | |
CN103873257A (en) | Secrete key updating, digital signature and signature verification method and device | |
CN203554473U (en) | Chaotic synchronous control system for secure communication system | |
KR102024062B1 (en) | Device of transmitting key data to subscriber in multicast group | |
US20190199526A1 (en) | Communication system and data communication method | |
CN106487495B (en) | Lightweight RFID authentication method based on integer chaos |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |