KR102308246B1 - Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same - Google Patents

Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same Download PDF

Info

Publication number
KR102308246B1
KR102308246B1 KR1020200018956A KR20200018956A KR102308246B1 KR 102308246 B1 KR102308246 B1 KR 102308246B1 KR 1020200018956 A KR1020200018956 A KR 1020200018956A KR 20200018956 A KR20200018956 A KR 20200018956A KR 102308246 B1 KR102308246 B1 KR 102308246B1
Authority
KR
South Korea
Prior art keywords
quantum
user
secret
encryption
random number
Prior art date
Application number
KR1020200018956A
Other languages
Korean (ko)
Other versions
KR20210104336A (en
Inventor
정부석
남대현
백정현
조성준
서강원
Original Assignee
주식회사 이와이엘
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 이와이엘 filed Critical 주식회사 이와이엘
Priority to KR1020200018956A priority Critical patent/KR102308246B1/en
Priority to EP21756651.2A priority patent/EP4109811A4/en
Priority to US17/800,053 priority patent/US12058247B2/en
Priority to PCT/KR2021/002002 priority patent/WO2021167336A1/en
Publication of KR20210104336A publication Critical patent/KR20210104336A/en
Application granted granted Critical
Publication of KR102308246B1 publication Critical patent/KR102308246B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

본 발명은 양자난수 기반의 암호칩이 탑재된 비화기기를 이용한 비화통신 제공방법에 관한 것이다. 제1사용자단말기가 비화통신을 위한 서비스앱을 실행하여 제1사용자 비화기기와 사용자인증 수행으로 패턴인증타입의 사용자인증을 하고, 제1사용자단말기와 관리서버가 상호인증을 수행하는 단계와, 사용자인증이 완료되면, 제1사용자비화기기의 양자암호화칩에서 양자난수에 기반한 양자키를 생성 및 저장하고 생성된 양자키를 교환하는 단계와, 제1사용자비화기기가 교환된 양자키를 통하여 유도 및 저장하여 음성 암호통신 채널을 생성하는 단계를 포함한다.The present invention relates to a method for providing secret communication using a secret device equipped with a quantum random number-based encryption chip. The first user terminal executes the service app for secret communication to perform pattern authentication type user authentication by performing user authentication with the first user secret device, and the first user terminal and the management server perform mutual authentication; When authentication is completed, generating and storing a quantum key based on a quantum random number in the quantum encryption chip of the first user secret device and exchanging the generated quantum key; and creating a voice encrypted communication channel by storing it.

Description

양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공방법{Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same}Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same}

본 발명은 양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공 방법에 관한 것으로, 특히, 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 통해 엔드-투-엔드 단말기간 음성통신이 가능하여 보안성이 향상된 양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공방법에 관한 것이다. The present invention relates to a secret device equipped with a quantum encryption chip based on a quantum random number and a method for providing a secret communication service using the same. To a secret device equipped with a quantum random number-based quantum encryption chip with improved security by enabling voice communication, and a method for providing a secret communication service using the same.

최근 유무선 통화 내용을 도청하는 기술이 상당히 발달하여 기술정보를 비롯하여 각종 사생활 정보를 유출되어 경제적 또는 사회적문제를 야기하고 있다. 국방분야 뿐 아니라 국가 간의 정보전쟁, 사활을 건 기업간의 경쟁, 정치활동 등의 현장에서 도청이 만연하고 있다. 특히 스마트폰은 해킹·도청에 취약하며, 특히 무선통신망에 대한 보안은 현재 심각한 상황이다. In recent years, the technology for wiretapping the contents of wired and wireless calls has developed considerably, and various kinds of personal information, including technical information, are leaked, causing economic or social problems. Wiretapping is widespread not only in the field of national defense, but also in information wars between countries, competition between life and death companies, and political activities. In particular, smartphones are vulnerable to hacking and eavesdropping, and the security of wireless communication networks in particular is currently serious.

이러한 문제를 해결하기 위해 다양한 형태의 비화통신장치가 개발되고 있으나, 의사 난수 기반의 암호키 생성을 통한 비화통신기술로 해킹에 취약한 문제가 있다.In order to solve this problem, various types of secret communication devices have been developed, but there is a problem that is vulnerable to hacking due to the secret communication technology through pseudo-random number-based encryption key generation.

선행기술로는 등록특허 제10-1107241호(비화 통신을 제공하는 장치 및 방법)가 있으나, 휴대 전화기와 연결된 비화 통신용 동글을 통해 비화 통신하는 기술이 개시되어 있으나 보안에 취약한 문제점이 있다. As a prior art, there is registered Patent No. 10-1107241 (device and method for providing secret communication), but a technology for secret communication through a dongle for secret communication connected to a mobile phone is disclosed, but has a weak security problem.

본 발명이 해결하고자 하는 과제는 보안에 취약한 문제를 해결하기 위해 양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공방법에 관한 것이다. The problem to be solved by the present invention relates to a secret device equipped with a quantum random number-based quantum encryption chip and a method for providing a secret communication service using the same in order to solve the problem of weak security.

본 발명은 안출된 과제를 해결하기 위해 음성암호통신채널을 생성하는 단계와 암호화음성통신을 수행하는 단계로 구분되며, 음성암호통신채널을 생성하는 단계는, 제1사용자단말기가 비화통신을 위한 비화기기 서비스앱를 실행하여 PIN 또는 패턴을 입력하면, 제1사용자 비화기기와 제1사용자단말기간 기기인증 후, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 사용자인증이 완료되면, 제1사용자비화기기의 양자암호화칩에서 양자비밀키 a를 생성하고, 양자공개키 A를 제2사용자비화기기에 전송하는 단계와, 제1사용자비화기기가 양자암호키를 유도 및 저장하여 제2사용자 비화기기와 음성 암호통신 채널을 생성하는 단계를 포함한다.The present invention is divided into a step of creating a voice encrypted communication channel and a step of performing encrypted voice communication in order to solve the devised problem, and the step of generating the voice encrypted communication channel is, the first user terminal is When a PIN or pattern is entered by executing the device service app, after device authentication between the first user secret device and the first user terminal, performing remote authentication between the first user terminal and the management server, and when user authentication is completed, 1 generating a quantum secret key a from the quantum encryption chip of the user secret device, and transmitting the quantum public key A to the second user secret device; It includes the step of creating a voice encryption communication channel with the secret device.

암호화음성통신을 수행하는 단계는, 제1사용자단말기가 비화통신을 위한 서비스를 실행하여 제1사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 제2사용자단말기가 비화통신을 위한 서비스를 실행하여 제2사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제2사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 인증이 완료되어 제1사용자비화기기에 음성이 입력되면, 제1사용자비화기기가 음성데이터를 암호화하고 암호화된 음성데이터를 제1사용자단말기에 송신하는 단계와, 인증이 완료되어 제2사용자비화기기에 음성이 입력되면, 제2사용자비화기기가 음성데이터를 암호화하고 암호화된 음성데이터를 제2사용자단말기에 송신하는 단계와, 제1사용자단말기가 제2사용자단말기를 통해 제2사용자비화기기에 암호화된 음성데이터를 송신하고, 제2사용자 비화기기가 음성데이터를 복호화하여 스피커에 출력하는 단계와, 제2사용자단말기가 제1사용자단말기를 통해 제1사용자비화기기에 암호화된 음성데이터를 송신하고, 제1사용자 비화기기가 음성데이터를 복호화하여 스피커에 출력하는 단계를 포함한다.In the step of performing encrypted voice communication, the first user terminal executes a service for secret communication, performs device authentication through user authentication between the first user secret device and the app, and performs remote authentication between the first user terminal and the management server. performing, the second user terminal executing a service for secret communication, performing device authentication through user authentication between the second user secret device and the app, and performing remote authentication between the second user terminal and the management server; , when the authentication is completed and voice is input to the first user secret device, the first user secret device encrypts the voice data and transmits the encrypted voice data to the first user terminal, and the authentication is completed to the second user secret device When a voice is input to the device, the second user secret device encrypts the voice data and transmits the encrypted voice data to the second user terminal, the first user terminal to the second user secret device through the second user terminal Transmitting the encrypted voice data, the second user secret device decrypting the voice data and outputting it to the speaker, and the second user terminal transmits the encrypted voice data to the first user secret device through the first user terminal, , the first user secret device decoding the voice data and outputting the decoded voice data to the speaker.

본 발명에 의하면 양자난수기반의 양자암호화칩이 탑재된 비화기기를 사용하고, 엔드-투-엔드 단말기간 음성통신이 가능하여 양자암호화키를 통하여 보안성이 향상되는 효과가 있다. According to the present invention, a secret device equipped with a quantum encryption chip based on a quantum random number is used, and voice communication between end-to-end terminals is possible, thereby improving security through a quantum encryption key.

스마트폰 또는 IoT기기와 분리된 별도의 비화기기를 제공하여 보안성이 향상되며, 다양한 암호알고리즘을 탑재하여 다양한 서비스 플랫폼과 유연하게 연동할 수 있는 효과가 있다. Security is improved by providing a separate secret device separated from a smartphone or IoT device, and it has the effect of being able to flexibly interwork with various service platforms by mounting various cryptographic algorithms.

도 1은 본 발명의 실시예에 따른 양자난수 기반의 암호칩이 탑재된 비화기기의 동작 방법을 설명하는 개념도이다.
도 2는 본 발명의 실시예에 따른 양자키 교환방법을 설명하는 순서도이다.
도 3은 본 발명의 실시예에 따른 음성통신방법을 설명하는 순서도이다.
도 4는 본 발명의 실시예에 따른 비화기기의 구성을 설명하는 블록도이다.
1 is a conceptual diagram illustrating a method of operating a secret device equipped with an encryption chip based on a quantum random number according to an embodiment of the present invention.
2 is a flowchart illustrating a quantum key exchange method according to an embodiment of the present invention.
3 is a flowchart illustrating a voice communication method according to an embodiment of the present invention.
4 is a block diagram illustrating the configuration of a secret device according to an embodiment of the present invention.

본 명세서에 개시되어 있는 본 발명의 개념에 따른 실시예들에 대해서 특정한 구조적 또는 기능적 설명은 단지 본 발명의 개념에 따른 실시예들을 설명하기 위한 목적으로 예시 된 것으로서, 본 발명의 개념에 따른 실시예들은 다양한 형태들로 실시될 수 있으며 본 명세서에 설명된 실시예들에 한정되지 않는다.Specific structural or functional descriptions of the embodiments according to the concept of the present invention disclosed in this specification are merely illustrative for the purpose of describing the embodiments according to the concept of the present invention, and the embodiments according to the concept of the present invention These may be embodied in various forms and are not limited to the embodiments described herein.

본 발명의 개념에 따른 실시예들은 다양한 변경들을 가할 수 있고 여러 가지 형태들을 가질 수 있으므로 실시예들을 도면에 예시하고 본 명세서에서 상세하게 설명하고자 한다. 그러나 이는 본 발명의 개념에 따른 실시예들을 특정한 개시 형태들에 대해 한정하려는 것이 아니며, 본 발명의 사상 및 기술 범위에 포함되는 모든 변경, 균등물 또는 대체물을 포함한다.Since the embodiments according to the concept of the present invention may have various changes and may have various forms, the embodiments will be illustrated in the drawings and described in detail herein. However, this is not intended to limit the embodiments according to the concept of the present invention to specific disclosed forms, and includes all modifications, equivalents or replacements included in the spirit and scope of the present invention.

본 명세서에서 사용한 용어는 단지 특정한 실시예를 설명하기 위해 사용된 것으로서, 본 발명을 한정하려는 의도가 아니다. 단수의 표현은 문맥상 명백하게 다르게 뜻하지 않는 한, 복수의 표현을 포함한다. 본 명세서에서, "포함하다" 또는 "가지다" 등의 용어는 본 명세서에 기재된 특징, 숫자, 단계, 동작, 구성 요소, 부분품 또는 이들을 조합한 것이 존재함을 지정하려는 것이지, 하나 또는 그 이상의 다른 특징들이나 숫자, 단계, 동작, 구성 요소, 부분품 또는 이들을 조합한 것들의 존재 또는 부가 가능성을 미리 배제하지 않는 것으로 이해되어야 한다.The terms used herein are used only to describe specific embodiments, and are not intended to limit the present invention. The singular expression includes the plural expression unless the context clearly dictates otherwise. In the present specification, terms such as "comprise" or "have" are intended to designate that a feature, number, step, operation, component, part, or combination thereof described herein exists, but one or more other features It is to be understood that it does not preclude the possibility of the presence or addition of numbers, steps, operations, components, parts, or combinations thereof.

이하, 본 명세서에 첨부된 도면들을 참조하여 본 발명의 실시예들을 상세히 설명한다.Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

도 1은 본 발명의 실시예에 따른 양자난수 기반의 암호칩이 탑재된 비화기기의 동작 방법을 설명하는 개념도이다.1 is a conceptual diagram illustrating a method of operating a secret device equipped with a quantum random number-based encryption chip according to an embodiment of the present invention.

제1사용자는 제1사용자단말기(200)와 블루투스 페어링된 제1사용자 비화기기(100)를 사용하여 관리서버(500)로부터 인증된 사용자들과 비화음성통신을 할 수 있다. 즉, 송신자인 제1사용자는 제1사용자비화기기(100)의 마이크에 음성을 입력하면, 제1사용자비화기기(100)에서 입력된 음성이 양자암호키에 기반하여 암호화되고, 암호화된 음성데이터가 제1사용자단말기(200)에 전송된 후, 통신망을 거쳐 제2사용자단말기(300)에 전달되고, 제2사용자단말기(300)와 블루투스 페어링된 제2사용자비화기기(400)에 전달되어 양자난수에 기반한 양자암호화키로 복호화 후 제2사용자가 청취할 수 있다. 즉, 제1사용자와 제2사용자는 인증된 각자의 비화기기를 통해 비화통신이 가능하며, 비화기기 내에 장착된 양자난수기반의 양자암호화칩에 의해 생성된 양자암호키를 사용함으로써 종래의 비화통신보다 보안성이 보다 향상된 비화통신이 가능하다. The first user may use the first user secret device 100 paired with the first user terminal 200 to perform non-choice voice communication with users authenticated by the management server 500 . That is, when the first user, the sender, inputs a voice into the microphone of the first user secret device 100 , the voice input from the first user secret device 100 is encrypted based on the quantum encryption key, and the encrypted voice data is transmitted to the first user terminal 200, is transmitted to the second user terminal 300 through the communication network, and is transmitted to the second user secret device 400 paired with the second user terminal 300 by Bluetooth. After decryption with the quantum encryption key based on the random number, the second user can listen. That is, the first user and the second user can perform secret communication through their respective authenticated secret devices, and by using the quantum encryption key generated by the quantum random number-based quantum encryption chip installed in the secret device, the conventional secret communication Secret communication with improved security is possible.

도 2는 본 발명의 실시예에 따른 양자암호키 교환방법을 설명하는 순서도이다.2 is a flowchart illustrating a quantum encryption key exchange method according to an embodiment of the present invention.

도 2를 참조하면, 제1사용자 비화기기(100)와 제1사용자단말기(200)가 블루투스 페어링되고(S201), 제1사용자단말기(200)에서 비화통신을 위한 서비스를 실행하고(S203), 제1사용자단말기(200)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S205). PIN 또는 패턴입력을 통해 사용자인증이 입력되면, 제1사용자 비화기기(100)와 제1사용자단말기(200)는 서로 기기인증을 수행한다(S207). 이후에, 제1사용자단말기(200)는 관리서버(500)에 리모트 인증을 수행한다(S209). Referring to FIG. 2 , the first user secret device 100 and the first user terminal 200 are Bluetooth paired (S201), and the first user terminal 200 executes a service for secret communication (S203), User authentication is performed through PIN or pattern input to the first user terminal 200 (S205). When user authentication is input through PIN or pattern input, the first user secret device 100 and the first user terminal 200 perform device authentication with each other (S207). Thereafter, the first user terminal 200 performs remote authentication to the management server 500 (S209).

제2사용자 비화기기(400)와 제2사용자단말기(300)가 블루투스 페어링되고(S211), 제2사용자단말기(300)에서 비화통신을 위한 서비스를 실행하고(S213), 제2사용자단말기(300)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S215). PIN 또는 패턴입력을 통해 사용자인증이 입력되면, 제2사용자 비화기기(400)와 제2사용자단말기(300)는 서로 기기인증을 수행한다(S217). 이후에, 제2사용자단말기는 관리서버(500)에 리모트 인증을 수행한다(S219). The second user secret device 400 and the second user terminal 300 are Bluetooth paired (S211), and the second user terminal 300 executes a service for secret communication (S213), and the second user terminal 300 ) through PIN or pattern input to perform user authentication (S215). When user authentication is input through PIN or pattern input, the second user secret device 400 and the second user terminal 300 perform device authentication with each other (S217). Thereafter, the second user terminal performs remote authentication to the management server 500 (S219).

사용자 인증이 완료되면, 제1사용자 비화기기(100)는 양자비밀키a를 생성하고 저장하고(S221), 제2사용자 비화기기(400)는 양자비밀키b를 생성하고 저장한다(S223). 이때, 양자비밀키a와 양자비밀키b는 양자난수로서, 양자특성을 이용하여 패턴 분석과 예측이 불가능하고 무질서한 순수난수로 생성될 수 있다. When user authentication is completed, the first user secret device 100 generates and stores the quantum secret key a (S221), and the second user secret device 400 generates and stores the quantum secret key b (S223). In this case, the quantum secret key a and the quantum secret key b are quantum random numbers, and pattern analysis and prediction using quantum properties are impossible and can be generated as pure random numbers in disorder.

제1사용자 비화기기(100)는 생성된 양자공개키A를 제2사용자 비화기기(400)에 전송하고(S225), 제2사용자 비화기기(400)는 생성된 양자공개키B를 제1사용자 비화기기(100)에 전송하여(S226) 각각의 양자공개키를 서로 교환한다.The first user secret device 100 transmits the generated quantum public key A to the second user secret device 400 (S225), and the second user secret device 400 transmits the generated quantum public key B to the first user. It is transmitted to the secret device 100 (S226) to exchange each quantum public key with each other.

제1사용자 비화기기(100)는 양자암호키를 유도하여 저장하고(S227), 제2사용자 비화기기(400)는 양자암호키를 유도하여 저장한다(S229). 제1사용자 비화기기(100)와 제2사용자 비화기기(400)는 음성 암호통신 채널을 생성한다(S231). 이때, 제1사용자 비화기기의 양자난수에서 유도된 유도키로 키 암복호 알고리즘을 통해 암복호화하고, 제2사용자 비화기기의 양자난수에서 유도된 유도키로 암복호 알고리즘 을 통해 암복호화하는 음성 암호통신 채널을 생성할 수 있다.The first user secret device 100 derives and stores the quantum encryption key (S227), and the second user secret device 400 derives and stores the quantum encryption key (S229). The first user secret device 100 and the second user secret device 400 create a voice encrypted communication channel (S231). At this time, a voice encryption communication channel that encrypts and decrypts through a key encryption/decryption algorithm with a derivation key derived from a quantum random number of the first user secret device, and encrypts and decrypts through an encryption/decryption algorithm with a derivation key derived from a quantum random number of the second user secret device. can create

도 3은 본 발명의 실시예에 따른 음성통신방법을 설명하는 순서도이다.3 is a flowchart illustrating a voice communication method according to an embodiment of the present invention.

도 3을 참조하면, 제1사용자 비화기기(100)와 제1사용자단말기(200)가 블루투스 페어링하고(S301), 제1사용자단말기(200)에서 비화통신을 위한 서비스를 실행하여(S303), 제1사용자단말기(200)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S305). PIN 또는 패턴과 같은 사용자인증이 입력되면, 제1사용자 비화기기(100)와 제1사용자단말기(200)는 서로 기기인증을 수행한다(S307). 이후에, 제1사용자단말기(200)는 관리서버(500)에 리모트 인증을 수행한다(S309). Referring to FIG. 3, the first user secret device 100 and the first user terminal 200 perform Bluetooth pairing (S301), and execute a service for secret communication in the first user terminal 200 (S303), User authentication is performed through PIN or pattern input to the first user terminal 200 (S305). When user authentication such as PIN or pattern is input, the first user secret device 100 and the first user terminal 200 perform device authentication with each other (S307). Thereafter, the first user terminal 200 performs remote authentication to the management server 500 (S309).

제2사용자 비화기기(400)와 제2사용자단말기(300)가 블루투스 페어링하고(S311), 제2사용자단말기(300)에서 비화통신을 위한 서비스를 실행하여(S313), 제2사용자단말기(300)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S315). PIN 또는 패턴과 같은 사용자인증이 입력되면, 제2사용자 비화기기(400)와 제2사용자단말기(300)는 서로 기기인증을 수행한다(S317). 이후에, 제2사용자단말기는 관리서버(500)에 리모트 인증을 수행한다(S319). The second user secret device 400 and the second user terminal 300 perform Bluetooth pairing (S311), and execute a service for secret communication in the second user terminal 300 (S313), the second user terminal 300 ) through PIN or pattern input to perform user authentication (S315). When user authentication such as PIN or pattern is input, the second user secret device 400 and the second user terminal 300 perform device authentication with each other (S317). Thereafter, the second user terminal performs remote authentication to the management server 500 (S319).

제1사용자가 제1사용자 비화기기(100)의 마이크에 음성을 입력하면(S321), 제1사용자 비화기기(100)는 수신된 음성데이터를 암호화하고(S323), 암호화 음성데이터를 제1사용자단말기(200)로 송신한다. 제1사용자단말기(200)는 관리서버(500) 및 제2사용자단말기(300)를 통해 제2사용자 비화기기(400)에 송신한다(S325). 제2사용자비화기기(400)는 수신된 음성데이터를 복호화하고(S327), 복호화한 음성데이터를 스피커로 출력한다(S329). When the first user inputs a voice into the microphone of the first user secret device 100 (S321), the first user secret device 100 encrypts the received voice data (S323), and transmits the encrypted voice data to the first user It is transmitted to the terminal 200 . The first user terminal 200 transmits to the second user secret device 400 through the management server 500 and the second user terminal 300 (S325). The second user secret device 400 decodes the received voice data (S327), and outputs the decoded voice data to the speaker (S329).

제2사용자가 제2사용자 비화기기의 마이크에 음성을 입력하면(S331), 제2사용자 비화기기(400)는 수신된 음성데이터를 암호화하고(S333), 암호화 음성데이터를 제2사용자단말기(300)로 송신한다. 제2사용자단말기(300)는 제1사용자단말기(100)를 통해 제1사용자 비화기기에 송신한다(S325). 제1사용자비화기기(100)는 수신된 음성데이터를 복호화하고(S337), 복호화한 음성데이터를 스피커로 출력한다(S339). When the second user inputs a voice into the microphone of the second user secret device (S331), the second user secret device 400 encrypts the received voice data (S333), and transmits the encrypted voice data to the second user terminal 300 ) to send The second user terminal 300 transmits to the first user secret device through the first user terminal 100 (S325). The first user secret device 100 decodes the received voice data (S337), and outputs the decoded voice data to the speaker (S339).

도 4는 본 발명의 실시예에 따른 비화기기의 구성을 설명하는 블록도이다.4 is a block diagram illustrating the configuration of a secret device according to an embodiment of the present invention.

도 4를 참조하면, 비화기기(100)는 양자암호화칩(110), 메모리부(120), 마이크 및 스피커부(130), 코덱부(141), 통신부(150), 전원제어모듈(160)로 구성된다. Referring to FIG. 4 , the secret device 100 includes a quantum encryption chip 110 , a memory unit 120 , a microphone and speaker unit 130 , a codec unit 141 , a communication unit 150 , and a power control module 160 . is composed of

양자암호화칩(110)는 양자난수생성기(QRNG)와 암호모듈(113)로 구성된다. 양자난수생성기에 양자엔트로피소스(111)을 탑재하여 양자엔트로피소스에 기초하여 양자난수를 생성할 수 있다. 상기 양자난수는 양자특성을 이용하여 패턴 분석과 예측이 불가능한 완변하게 무질서한 순수난수로 생성될 수 있다.The quantum encryption chip 110 is composed of a quantum random number generator (QRNG) and an encryption module 113 . By mounting the quantum entropy source 111 in the quantum random number generator, a quantum random number can be generated based on the quantum entropy source. The quantum random number may be generated as a completely disordered pure random number that cannot be patterned and predicted by using quantum characteristics.

QRNG(112)는 양자엔트로피소스(111)와 DRBG로 구성된다. QRNG(112)는 양자엔트로피소스(111)를 입력값으로하여 DRBG 알고리즘에 의해 양자난수를 생성할 수 있다.The QRNG 112 is composed of a quantum entropy source 111 and a DRBG. The QRNG 112 may generate a quantum random number by the DRBG algorithm using the quantum entropy source 111 as an input value.

암호모듈(113)은 Secure 모듈(115), MCU(117), Side Channel Resistant 모듈(116), 전원모듈(118)로 구성된다. 암호모듈(113)은 QRNG(112)에서 생성된 양자난수를 이용하여 양자암호화키를 생성한다. 생성된 양자암호화키로 암호화 대상에 대하여 Secure모듈(115)내의 AES 알고리즘으로 암호화 및 복호화를 실행하며 생성된 암호화키를 보관할 수 있다. Side Channel Resistant 모듈은 보관된 암호화키를 부채널공격(SCA Attack)으로부터 방어할 수 있다. The encryption module 113 is composed of a Secure module 115 , an MCU 117 , a Side Channel Resistant module 116 , and a power module 118 . The encryption module 113 generates a quantum encryption key using the quantum random number generated by the QRNG 112 . Encryption and decryption are executed with the AES algorithm in the Secure module 115 for the encryption target with the generated quantum encryption key, and the generated encryption key can be stored. The Side Channel Resistant module can protect the stored encryption key from side channel attacks (SCA Attack).

메모리부(120)는 비화기기의 주 메모리로서 생성된 양자 양자키를 저장할 수 있다.The memory unit 120 may store the generated quantum quantum key as the main memory of the secret device.

마이크 및 스피커부(130)는 사용자로부터 음성을 입력받거나, 상대방의 음성을 오디오로 변환하여 출력할 수 있다. The microphone and speaker unit 130 may receive a voice input from the user, or convert the other party's voice into audio and output it.

코덱부(141)는 음성신호를 디지털 신호로 변환시킬 수 있다.The codec unit 141 may convert an audio signal into a digital signal.

통신부(150)는 블루투스를 통해 사용자단말과 연결될 수 있고, 소정의 등록 절차에 따라 사용자단말에 등록되면, 블루투스의 사용자 인증 기능을 이용하여 사용자단말에 등록된 비화기기의 고유 어드레스에 따라 접속된 사용자를 구분할 수 있다.The communication unit 150 may be connected to the user terminal through Bluetooth, and when registered in the user terminal according to a predetermined registration procedure, the user connected according to the unique address of the secret device registered in the user terminal using the user authentication function of Bluetooth can be distinguished.

발명은 도면에 도시된 실시예를 참고로 설명되었으나 이는 예시적인 것에 불과하며, 본 기술 분야의 통상의 지식을 가진 자라면 이로부터 다양한 변형 및 균등한 타 실시 예가 가능하다는 점을 이해할 것이다. 따라서, 본 발명의 진정한 기술적 보호 범위는 첨부된 등록청구범위의 기술적 사상에 의해 정해져야 할 것이다.Although the invention has been described with reference to the embodiment shown in the drawings, this is merely exemplary, and those skilled in the art will understand that various modifications and equivalent other embodiments are possible therefrom. Accordingly, the true technical protection scope of the present invention should be determined by the technical spirit of the appended claims.

100; 비화기기 110; 양자암호화칩
120; 메모리부 130; 마이크 및 스피커부
141; 코덱부 150; 통신부
160; 전원제어모듈
100; igniter 110; Quantum Encryption Chip
120; memory unit 130; microphone and speaker
141; codec unit 150; communication department
160; power control module

Claims (5)

양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법에 있어서,
양자키를 교환하여 암호화 통신 채널을 생성하는 단계와, 제1사용자단말기와 제2사용자단말기간 음성통신하는 단계를 포함하고,
상기 양자키를 교환하여 암호화 통신 채널을 생성하는 단계는,
제1사용자단말기가 비화통신을 위한 비화기기 서비스앱를 실행하여 PIN 또는 패턴을 입력하면, 제1사용자 비화기기와 제1사용자단말기간 기기인증 후, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계;
사용자인증이 완료되면, 제1사용자비화기기의 양자암호화칩에서 양자비밀키 a를 생성하고, 양자공개키 A를 제2사용자비화기기에 전송하는 단계; 및
제1사용자비화기기가 양자암호키를 유도 및 저장하여 제2사용자 비화기기와 음성 암호통신 채널을 생성하는 단계를 포함하고
상기 제1사용자단말기와 제2사용자단말기간 음성통신하는 단계는,
제1사용자단말기가 비화통신을 위한 서비스를 실행하여 제1사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계;
제2사용자단말기가 비화통신을 위한 서비스를 실행하여 제2사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제2사용자단말기와 관리서버간 리모트 인증을 수행하는 단계;
인증이 완료되어 제1사용자비화기기에 음성이 입력되면, 제1사용자비화기기가 음성데이터를 암호화하고 암호화된 음성데이터를 제1사용자단말기에 송신하는 단계;
인증이 완료되어 제2사용자비화기기에 음성이 입력되면, 제2사용자비화기기가 음성데이터를 암호화하고 암호화된 음성데이터를 제2사용자단말기에 송신하는 단계;
제1사용자단말기가 제2사용자단말기를 통해 제2사용자비화기기에 암호화된 음성데이터를 송신하고, 제2사용자 비화기기가 음성데이터를 복호화하여 스피커에 출력하는 단계; 및
제2사용자단말기가 제1사용자단말기를 통해 제1사용자비화기기에 암호화된 음성데이터를 송신하고, 제1사용자 비화기기가 음성데이터를 복호화하여 스피커에 출력하는 단계를 포함하고,
상기 제1사용자 비화기기와 상기 제2사용자 비화기기는,
양자엔트로피소스와 암호모듈로 구성된 양자암호화칩을 포함하고,
상기 암호모듈은 양자난수생성기에서 생성된 양자난수를 이용하여 양자암호화키를 생성하고, 생성된 양자암호화키로 암호화 대상에 대하여 Secure모듈내의 AES 알고리즘으로 암호화 및 복호화를 실행하며, 생성된 암호화키를 보관하고, 보관된 암호화키를 부채널공격(SCA Attack)으로부터 방어하는 Side Channel Resistant 모듈을 구비하는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
In the method of providing a secret communication service using a secret device equipped with a quantum random number-based quantum encryption chip,
Creating an encrypted communication channel by exchanging a quantum key, comprising the step of voice communication between the first user terminal and the second user terminal,
Creating an encrypted communication channel by exchanging the quantum key includes:
When the first user terminal executes the secret device service app for secret communication and inputs a PIN or pattern, after device authentication between the first user secret device and the first user terminal, remote authentication between the first user terminal and the management server is performed. step;
When user authentication is completed, generating a quantum secret key a in the quantum encryption chip of the first user secret device, and transmitting the quantum public key A to the second user secret device; and
and generating, by the first user secret device, a voice encryption communication channel with the second user secret device by inducing and storing the quantum encryption key,
The step of performing voice communication between the first user terminal and the second user terminal,
performing, by the first user terminal, a service for secret communication, performing device authentication through user authentication between the first user secret device and the app, and performing remote authentication between the first user terminal and the management server;
performing, by the second user terminal, a service for secret communication, performing device authentication through user authentication between the second user secret device and the app, and performing remote authentication between the second user terminal and the management server;
When the authentication is completed and voice is input to the first user secret device, the first user secret device encrypts the voice data and transmits the encrypted voice data to the first user terminal;
When the authentication is completed and voice is input to the second user secret device, the second user secret device encrypts the voice data and transmits the encrypted voice data to the second user terminal;
transmitting, by the first user terminal, the encrypted voice data to the second user secret device through the second user terminal, and the second user secret device decrypting the voice data and outputting it to the speaker; and
The second user terminal transmits the encrypted voice data to the first user secret device through the first user terminal, and the first user secret device decrypts the voice data and outputs it to a speaker,
The first user secret device and the second user secret device,
It includes a quantum encryption chip consisting of a quantum entropy source and an encryption module,
The encryption module generates a quantum encryption key using the quantum random number generated by the quantum random number generator, performs encryption and decryption with the AES algorithm in the Secure module for the encryption target with the generated quantum encryption key, and stores the generated encryption key A method of providing a secret communication service using a secret device equipped with a quantum random number-based quantum encryption chip having a Side Channel Resistant module that protects the stored encryption key from side channel attacks (SCA Attack).
제1항에 있어서,
상기 음성 암호통신 채널을 생성하는 단계는,
제1사용자 비화기기의 양자난수에서 유도된 양자키로 암복호 알고리즘을 통해 암복호화하고, 제2사용자비화기기의 양자난수에서 유도된 양자키로 암복호 알고리즘을 통해 암복호화하는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
According to claim 1,
The step of creating the voice encrypted communication channel comprises:
A quantum random number-based quantum encryption chip that encrypts and decrypts through an encryption/decryption algorithm with a quantum key derived from the quantum random number of the first user secret device, and encrypts and decrypts through the encryption/decryption algorithm with a quantum key derived from the quantum random number of the second user secret device A method of providing secret communication service using this mounted secret device.
삭제delete 제1항에 있어서,
상기 암호화 및 복호화하는 단계는,
제1사용자 비화기기의 양자난수에서 유도된 양자키로 암복호 알고리즘을 통해 음성데이터를 암복호화하고, 제2사용자 비화기기의 양자난수에서 유도된 양자키로 음성데이터를 암복호 알고리즘을 통해 암복호화하는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
According to claim 1,
The encryption and decryption steps include:
Quantum that encrypts and decrypts voice data through an encryption/decryption algorithm with a quantum key derived from a quantum random number of the first user's secret device, and encrypts and decrypts voice data through an encryption/decryption algorithm with a quantum key derived from a quantum random number of a second user's secret device A method of providing a secret communication service using a secret device equipped with a random number-based quantum encryption chip.
제1항에 있어서,
상기 양자암호화칩은 양자난수생성기를 탑재하여 양자난수를 생산하고, 상기 양자난수는 양자특성을 이용하여 패턴 분석과 예측이 불가능하고 무질서한 순수난수로 생성되는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
According to claim 1,
The quantum encryption chip is equipped with a quantum random number generator to produce a quantum random number, and the quantum random number is a quantum random number-based quantum encryption chip that cannot be analyzed and predicted using quantum characteristics and is generated as a disordered pure random number. A method of providing secret communication service using a device.
KR1020200018956A 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same KR102308246B1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020200018956A KR102308246B1 (en) 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
EP21756651.2A EP4109811A4 (en) 2020-02-17 2021-02-17 Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
US17/800,053 US12058247B2 (en) 2020-02-17 2021-02-17 Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
PCT/KR2021/002002 WO2021167336A1 (en) 2020-02-17 2021-02-17 Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020200018956A KR102308246B1 (en) 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same

Publications (2)

Publication Number Publication Date
KR20210104336A KR20210104336A (en) 2021-08-25
KR102308246B1 true KR102308246B1 (en) 2021-10-01

Family

ID=77495415

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020200018956A KR102308246B1 (en) 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same

Country Status (1)

Country Link
KR (1) KR102308246B1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100872817B1 (en) * 2006-12-07 2008-12-09 인하대학교 산학협력단 Method for Key Exchange Based on Varient of the Diffie Hellman
KR102023526B1 (en) * 2012-10-29 2019-09-20 아이디 퀀티크 에스.에이. Method for Enhancing Security of Secret Key Generated in Quantum Key Distribution System
KR20160121828A (en) * 2015-04-13 2016-10-21 (주)엑스톤 Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals
KR102017505B1 (en) * 2017-09-25 2019-09-03 주식회사 이와이엘 User authentication method using random number generator

Also Published As

Publication number Publication date
KR20210104336A (en) 2021-08-25

Similar Documents

Publication Publication Date Title
JP6736285B2 (en) Hearing device with communication protection and related methods
US8571188B2 (en) Method and device for secure phone banking
US20100034385A1 (en) Combinational combiner cryptographic method and apparatus
JP2019512961A (en) Method and system for user authentication with improved security
JP2010515083A5 (en)
CN104065648B (en) A kind of data processing method of voice call
Ntantogian et al. A survey of voice and communication protection solutions against wiretapping
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN113630238A (en) User request permission method and device based on password confusion
KR101358375B1 (en) Prevention security system and method for smishing
KR101078373B1 (en) System for authenticating a caller and Method thereof
KR102308247B1 (en) Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
EP4109811A1 (en) Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
KR102308246B1 (en) Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
KR102308248B1 (en) Encryption Gateway equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service between IoT device using the same
WO2015124798A2 (en) Method & system for enabling authenticated operation of a data processing device
TWM569453U (en) Digital data processing system
CN104080080B (en) A kind of data handling system of voice call
KR20130109560A (en) Encryption method of database of mobile communication device
WO2016030832A1 (en) Method and system for mobile data and communication security
CN104038932A (en) Security device
Haataja et al. Ten years of bluetooth security attacks: Lessons learned
CN108270916A (en) A kind of encryption method of smart mobile phone
TWI672653B (en) Digital data encryption method, digital data decryption method and digital data processing system
Boruchinkin et al. Cryptographic wireless communication device

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant