WO2019088689A1 - Système de terminal de sécurité cryptographique quantique puf-qrng, et procédé de génération de clé cryptographique - Google Patents

Système de terminal de sécurité cryptographique quantique puf-qrng, et procédé de génération de clé cryptographique Download PDF

Info

Publication number
WO2019088689A1
WO2019088689A1 PCT/KR2018/013095 KR2018013095W WO2019088689A1 WO 2019088689 A1 WO2019088689 A1 WO 2019088689A1 KR 2018013095 W KR2018013095 W KR 2018013095W WO 2019088689 A1 WO2019088689 A1 WO 2019088689A1
Authority
WO
WIPO (PCT)
Prior art keywords
local
remote
random number
quantum
server
Prior art date
Application number
PCT/KR2018/013095
Other languages
English (en)
Korean (ko)
Inventor
채령
이현규
변명현
장기형
Original Assignee
주식회사 로보티어
채령
이현규
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 로보티어, 채령, 이현규 filed Critical 주식회사 로보티어
Publication of WO2019088689A1 publication Critical patent/WO2019088689A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Definitions

  • the present invention relates to a PUF-QRNG quantum cryptographic security terminal system and a cryptographic key generation method which are composed of an ultra-small PUF (Phisycally Unclonable Function) chip and a QRNG (Quantum Random Number Generator).
  • a software-based random number generation technique uses a lot of resources and has a problem in that it can grasp a random number generation pattern by using an advanced hacking technique.
  • Quantum cryptography technology is based on the principle of quantum mechanics, which is the fundamental law of nature, not safety of mathematical computation. Quantum cryptography is also known as “Quantum Key Distribution Technology (QKD)" as a technique for securely real-time distribution of cryptographic keys (disposable random numbers) between a sender and a recipient based on the laws of quantum physics such as " have.
  • QKD Quantum Key Distribution Technology
  • the present invention relates to a security system that can secure a maximum security that can not be hacked by a quantum computer due to OTP (One Time Password) authentication security created by a physical object authentication PUF (Phisycally Unclonable Function) Chip and a Quantum Random Number Generator (QRNG) .
  • OTP One Time Password
  • PUF Physical object authentication
  • QRNG Quantum Random Number Generator
  • the security terminal includes a quantum random number generator and a PUF PIN data generator.
  • the PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip
  • the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number.
  • the One Time Password (OTP) authentication security generated by the physical object authentication PUF (Phisycally Unclonable Function) Chip of the present invention and the QRNG (Quantum Random Number Generator) generating a natural random number is the best security that can not be hacked by a quantum computer .
  • Unidirectional cryptographic key that transmits data only in one direction through single PIN data of non-replicable physical PUF chip and one-time OTP quantum cryptographic key using random natural number of quantum random number generators, and integrates with quantum terminal Way tunneling data communication only between servers, OTP (One Time Password) authentication security created through physical object authentication PUF Chip and QRNG generating natural random number has the highest security that can not be hacked by a quantum computer.
  • OTP One Time Password
  • the present invention has no memory burden and high processing speed due to physical security implemented in hardware.
  • FIG. 1 is a block diagram for understanding the present invention.
  • FIG. 2 is a block diagram of a security terminal according to an embodiment of the present invention.
  • FIG. 3 is a conceptual diagram for explaining a PUF according to the present invention.
  • FIG. 5 is a block diagram of a cryptographic key generation method according to the present invention.
  • FIG. 6 is a block diagram of a SoC in accordance with the present invention.
  • a PIN (Personal Identification Number) data is extracted from a PUF chip through a process deviation occurring in a semiconductor manufacturing process to generate a symmetric key (decryption key), and the symmetric key is encrypted with a random quantum random number generated through a QRNG To generate an asymmetric key (cryptographic key) and vice versa.
  • PUF generates a PIN as a circuit that generates different function values even if it is manufactured with the same design drawing by using the characteristic deviation caused by the process change.
  • the PIN may be generated using the digital value itself, rather than the digital value generated by the physical characteristics of the PUF.
  • a value obtained from an external reliable source may be used as a seed and a result value obtained by encrypting the original digital value generated by the PUF may be used as the PIN.
  • the digital value V PUF provided by the PUF is inserted into the seed and the hash function. Therefore, the finally used PIN value may be Hash (V PUF
  • the PIN when the private key is leaked by any path, the PIN can be easily changed by changing only the seed value, so that safety and convenience can be improved.
  • this PIN value generation is only a few embodiments, and the embodiments include both the case where the digital value itself generated by the PUF is used as a PIN, and the case where the value obtained by separately processing the PUF is used as a PIN.
  • the process of generating the new PIN by processing the digital value generated by the PUF will not be described in detail, but all of these embodiments should be understood.
  • the PUF has a random value that can not be predicted, so it can be used to determine the PIN of the device. If the PUF is used, it can prevent the pre-leakage of the PIN that may occur when the PUF is generated from the outside and stored in the memory.
  • the PIN value generated by the PUF is excellent in randomness, and in the embodiments, it is reliable that the value once generated does not change with time.
  • a serial number is stored in a serial number storage unit of a security terminal, the unique value of a device provided by a factory in the manufacturing process of the device, and the unique serial number of the device Input to the device via the I / O interface, and the secret key from the secret key module may be extracted to the factory or to the outside having administrative authority only once for the first time. It does not have to be once according to the policy, but it can be designated as one of security maintenance.
  • the device may be an electronic fuse (eFUSE) comprising a fuse portion.
  • eFUSE electronic fuse
  • the fuse block physically disconnects the connection between the secret key module and the I / O interface, which is irreversible. It is impossible for the subject having the management authority to safely manage the secret key extracted for the first time and it is impossible for the secret key of the device to be newly extracted after the fuse unit is cut off.
  • the apparatus and method for implementing the PUF (Physically Unclonable Function) by using the process deviation during semiconductor manufacturing and applying the method and apparatus for generating the identification key are used to enhance the security of the physical entity.
  • the PUF authenticates the physical terminal in hardware, generating an authentication request key (cryptographic key / decryption key) in which the PIN value of the PUF is generated as a one-time quantum random number OTP (One Time Password) .
  • OTP One Time Password
  • OTP One Time Password
  • PRNG pseudorandom number generator
  • a True Random Number Generator can generate a quantum random number (QRN) symmetric cryptographic key and a pseudorandom number (PRN) asymmetric cryptographic key, and a pair of symmetric cryptographic keys Way communication and authentication is possible.
  • QRN quantum random number
  • PRN pseudorandom number
  • An asymmetric cryptographic key that is re-encrypted through the pseudo-random number generator to the quantum random symmetric cryptographic key can be generated and the asymmetric cryptographic key can be decrypted through the symmetric cryptographic key.
  • the system according to the present invention includes a private key module for generating a private key to be used in a public key encryption / decryption communication method, and the private key module can provide a private key by a PUF separate from the private key module.
  • the private key generated and provided by the private key module is physically isolated from the outside and is not extracted externally from device manufacture to distribution and use.
  • the private key generated and provided by the private key module is physically isolated from the outside and is not extracted externally from device manufacture to distribution and use.
  • the device can authenticate the device through the PIN generated by itself in the object communication M2M.
  • the public key generation unit uses the private key generated by the private key module to generate a public key to be used by the device in the public key encryption / decryption communication method, and is stored in the public key storage unit.
  • the public key storage unit is a means for storing the generated public key, and may be a non-volatile memory according to an embodiment.
  • the public key storage unit can be selectively employed. In another embodiment, it is possible to read the public key generated by the public key generation unit whenever authentication is required without the public key storage unit.
  • the encryption / decryption processor can be understood as a Crypto-coprocessor for performing normal data encryption and decryption, and a configuration for exchanging actual encrypted data with the outside in the communication network is a communication interface.
  • the first extracted secret key is used only as a means of verifying that the entity is a legitimate entity when exchanging a public key with a Certification Authority (CA), which is a management entity having a proper authority to perform secure communication with the device do.
  • CA Certification Authority
  • the secret key which is already extracted once but not already used, is not directly used for encryption / decryption, but the secret key is used only in the process of sending the public key to the outside by the secret key encryption method, and double security is ensured. Therefore, the private key used for real device authentication is never exposed to the outside.
  • a Physically Unclonable Function can provide an unpredictable digital value.
  • the individual PUFs are given exact manufacturing processes, and even if they are manufactured in the same process, the digital values provided by the individual PUFs are different.
  • the PUF may be referred to as a physical one-way function (POWF) that is not replicable, and may also be referred to as a PRF (Physical Random Function).
  • PUF physical one-way function
  • PRF Physical Random Function
  • Such a PUF may be used to generate a cryptographic key for security and / or authentication.
  • a PUF can be used to provide a unique key to distinguish devices from one another.
  • a coating PUF is implemented using randomly doped particles in the top layer of the IC, and a coating PUF is generally used in a hardware chip such as a latch Butterfly PUF, which can be implemented in FPGA using process variation inside CMOS device, has also been implemented.
  • the PUF used in the present invention solves this conventional problem and can be produced at a very low unit price in the semiconductor manufacturing process while ensuring the time invariance and randomness to a very reliable level.
  • a random value is generated using the randomness due to the short circuit between the nodes existing in the semiconductor process.
  • the PUF is designed to realize the size of contacts or vias used for electrically connecting conductive layers (metal) in a semiconductor chip to a certain size or less than a design rule in the process, And whether or not a short circuit is caused to be randomly determined. That is, the PIN value is randomly generated by violating the design rule.
  • this new PUF circuit is composed of a very simple short circuit, there is no additional circuit or process and no special measuring device is needed. Since the process characteristics are used, the stability can be satisfied while maintaining the randomness of the values.
  • the vias are formed between the metal 1 layer 302 and the metal 2 layer 301 in the semiconductor manufacturing process.
  • the via size is between the group 310 and the group 330, some of the vias short-circuit the metal 1 layer 302 and the metal 2 layer 301, 302 and the metal 2 layer 301 can not be short-circuited.
  • the identification key generating unit short-circuits the metal 1 layer 302 and the metal 2 layer 301 and some of the vias are connected to the metal 1 layer 302 and the metal 2 layer 301, And the via size is set so as not to short-circuit the via.
  • the design rule for the via size differs depending on the semiconductor manufacturing process. For example, if the design rule of the via in the 0.18 um CMOS (Complementary Metal-Oxide-Semiconductor) process is set to 0.25 um, The via size is set to 0.19 ⁇ m in the generation section, so that the short circuit between the metal layers is stochastically distributed.
  • CMOS Complementary Metal-Oxide-Semiconductor
  • the secret key module and the private key module are configured by setting the via size such that the probability distribution is as close to 50% as possible.
  • This via size setting can be made by experimentation according to a specific specific semiconductor process.
  • the tamper resistance is not required for the PUF to cope with a physical attack by providing the secret key or the private key in a random and time-invariant manner.
  • Tamper-resistance which is mainly used in encryption modules to cope with physical attacks such as de-packaging, layout analysis, and memory attack, prevents the device's functions from functioning normally by deleting the contents of the memory device when attempting to release the device Protect the contents inside.
  • additional protection devices are required or the implementation means is complicated, which not only increases the cost but also has the possibility of unintentional equipment damage such as data erasure due to user's mistake or failure.
  • the PUF is implemented by the principle described above with reference to FIG. 3, there is no such problem.
  • the present invention uses a PUF, it is possible to provide a private key and a private key, which are robust against physical attacks and maintain randomness and time invariance without requiring additional cost such as tamper resistance.
  • the present invention generates a PIN that can be used as an authentication key for security authentication and is a time-invariant digital value whose value is not changed according to the surrounding environment after once generated, It is possible to prevent the security threats to the authentication scheme of the device (terminal) by adopting the quantum security technology to the security based on the PUF, so that more secure log authentication and three channel quantum security authentication technology .
  • PUF Chip is composed of System On Chip (SoC) and is composed of boot ROM, main CPU, I / O port, security MCU, SoC memory, PUF hardware pin (H / W PIN), and SPI (Serial Peripheral Interface) controller.
  • SoC System On Chip
  • I / O port I / O port
  • security MCU I / O port
  • SoC memory SoC memory
  • PUF hardware pin H / W PIN
  • SPI Serial Peripheral Interface
  • the debug interface is connected to the input / output port at the same time.
  • the system-on-chip internal programs and data can be accessed from the outside through the debugger interface. In this situation, there is no security measure to protect the data on the system on chip.
  • the security MCU operates for data security using the security key stored in the SoC memory and the security key from the unique PUF hardware pin.
  • the present invention provides a system-on-chip type PUF chip having a security function.
  • the PUF chip has an internal SoC memory access restriction, a main CPU, And to provide a system-on-chip security method that, when detected, restricting the boot ROM from booting.
  • USB Universal Serial Bus
  • a security MCU when a security MCU is additionally included in the main CPU, it is the hardware that implements the security algorithm, and takes charge of the operation portion that needs to receive control of the main CPU and process it at a high speed.
  • the main CPU judges whether or not the symmetric key or the asymmetric key generated from the random number such as the quantized random number (QRNG) and the PIN data of the PUF unique to the pseudo random number (PRNG) coincide with each other.
  • the random number such as the quantized random number (QRNG) and the PIN data of the PUF unique to the pseudo random number (PRNG) coincide with each other.
  • an apparatus for protecting an application program is provided.
  • a hacker changes a main CPU application program through a debugger interface or a serial peripheral interface bus (SPI)
  • the input / output port is shut off and the boot ROM is booted I can not.
  • SPI serial peripheral interface bus
  • PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate a symmetric key.
  • a symmetric key 1 is generated through PIN data of a PUF chip and is encrypted through a quantum random number generator (QRNG) to generate an asymmetric key 1.
  • QRNG quantum random number generator
  • the cipher text generated through the asymmetric key 1 is decrypted only through the symmetric key 1 and can be decrypted.
  • the asymmetric key 1 is re-encrypted with the pseudo random number 1 to generate the asymmetric key 2, and the asymmetric key 2 including the hash function 1 is stored in the asymmetric key 2.
  • the ciphertext generated through the asymmetric key 2 is decrypted only by the asymmetric key 1 and can be decrypted.
  • the asymmetric key 2 When the pseudo random number 2 is generated by putting the hash function 2 into the pseudo random number generator PRNG, the asymmetric key 2 is re-encrypted with the pseudo random number 2 to generate the asymmetric key 3, the asymmetric key 3 including the hash function 2, The asymmetric key 3 stores the hash functions 1 and 2, and the ciphertext (encrypted data) generated through the asymmetric key 3 is decrypted through the asymmetric key 1 or 2 to generate the n-th asymmetric key , As shown in FIG. 1, the asymmetric key 3 can be generated by encrypting the quantum random number generator with the asymmetric key 2 with the quantum random number generated through the (QRNG).
  • Differentiation occurs in decryption when generating a lower asymmetric key through a quantum random number generator and a pseudo random number generator.
  • the PUF chip-equipped security terminal can decrypt the data encrypted through the asymmetric key 1 - 3 through the asymmetric key 1 - 2 and the asymmetric key 1 - 1, the asymmetric key 1, and the symmetric key 1.
  • the pseudo-random number generating hash function of the pseudo-random number generator is stored in order, and the symmetric key 1 can decrypt all the ciphertexts generated by the asymmetric keys 1, 1-1, 1-2 and 1-3, Asymmetric key 1 can decrypt all ciphertexts created in 1-1, 1-2, and 1-3, and asymmetric key 1-1 can decrypt only ciphertexts created in 1-2, 1-3. Do.
  • the asymmetric key 2 and the asymmetric key 3 and the asymmetric key 3-1 can decrypt the ciphertext formed by the asymmetric key 3-2
  • the asymmetric key 3 is encrypted by a quantum random number (encrypted by a random quantum random number rather than a pseudo random number generated hash function), and the asymmetric key 3-1 and the asymmetric key 3-1 Key 3 can be hacked, but the asymmetric key 2 generated by the quantum random number generator is not hackable.
  • the asymmetric key generated through the quantum random number can decrypt the lower asymmetric key generated by the pseudo-random number generator, but before the asymmetric key generated through the quantum random number, only the asymmetric key generated through the quantum random number is decrypted And more can not be hacked by a quantum computer.
  • the asymmetric key becomes the symmetric key as compared with the lower asymmetric key in the newly generated order.
  • the PUF Chip is a System On Chip (SoC), which consists of a boot ROM, a central processing unit (CPU), an I / O port, a secure MCU (Machine Control Unit) PUF hardware pin (H / W PIN), and SPI (Serial Peripheral Interface) controller.
  • SoC System On Chip
  • CPU central processing unit
  • I / O port an I / O port
  • secure MCU Machine Control Unit
  • PUF hardware pin H / W PIN
  • SPI Serial Peripheral Interface
  • the CPU controls the secure MCU, boot ROM, SoC memory, I / O ports, PUF hardware pins, and SPI controller.
  • the CPU controls the secure MCU to extract PIN (Personal Identification Number) data from the PUF hardware pin, and is stored in the SoC memory and the platform memory of the high-speed quantum random number generator inside the security platform connected to the network.
  • PIN Personal Identification Number
  • the CPU controls the SPI controller to receive a quantum random number generated through a low-speed terminal random number source generator and transmits the quantum random number to the secure MCU.
  • the secure MCU generates a terminal symmetric cryptographic key using the PIN data in the SoC memory, and then generates a terminal asymmetric cryptographic key by encrypting the terminal symmetric cryptographic key with the quantum random number generated through the low-rate terminal random number source generator.
  • the quantum terminal is composed of a modem chip, a main MCU, a power amp, and a low-speed terminal quantum random number generator.
  • the low-rate terminal quantum random number generator includes a low-speed terminal random number source generator and a terminal PUF (Phisycally Unclonable Function) chip.
  • the secure MCU in the terminal PUF chip generates the terminal symmetric cryptographic key using the PIN data extracted from the PUF hardware pin and then generates the terminal asymmetric cryptographic key by encrypting the terminal symmetric cryptographic key with the quantum random number generated through the low rate terminal random number source generator And transmits the terminal symmetric cryptographic key and the terminal asymmetric cryptographic key to the main MCU in the quantum terminal.
  • the main MCU amplifies the terminal asymmetric cryptographic key and IP address data in Power Amp, and transmits the amplified data to a security platform through a modem chip.
  • the security platform transmits the terminal asymmetric cryptographic key and IP address data to the cloud server
  • the fast quantum random number generator in the secure platform comprises a high-speed random number source generator and a platform memory
  • the cloud server encrypts the high speed asymmetric cryptographic key with the terminal asymmetric cryptographic key as a modem chip of the quantum terminal IP address, and the quantum terminal decrypts the fast asymmetric cryptographic key encrypted with the terminal asymmetric cryptographic key using the terminal symmetric cryptographic key.
  • the cloud server decrypts the terminal symmetric cryptographic key with the fast symmetric cryptographic key.
  • the quantum terminal decrypts the fast symmetric cryptographic key with the terminal symmetric cryptographic key.
  • the internal low-speed local quantum random number generator comprises a low-speed local random number source generator, a local PUF (Phisycally Unclonable Function) chip and a low-speed local pseudo random number generator.
  • the PUF chip is mounted in a quantum terminal, the MCU in the quantum terminal generates unique PIN data, Stored in the platform memory;
  • the control server includes a quantum random number generator (QRNG) and a platform memory.
  • QRNG quantum random number generator
  • the control server generates a symmetric encryption key using a random random number generated through a quantum random number generator, encrypts the symmetric encryption key with PIN data stored in the platform memory To generate an asymmetric cryptographic key;
  • the control server transmits the asymmetric cryptographic key to the quantum terminal;
  • the quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server;
  • the control server connects the control server and the quantum terminal to open the bi-directional tunneling data communication when the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is decrypted with the asymmetric cryptographic key and the PIN data stored in the platform memory coincide with each other .
  • a PUF chip is mounted on a quantum terminal, and an MCU inside the quantum terminal generates unique PIN data using a physical process variation occurring during a manufacturing process And the PIN data is stored in a platform memory inside the control server;
  • the control server includes a quantum random number generator (QRNG) and a platform memory, and the control server generates a symmetric encryption key using PIN data stored in the platform memory, and the control server generates a symmetric cryptographic key using the quantum random number generated through the quantum random number generator.
  • QRNG quantum random number generator
  • the control server transmits the asymmetric cryptographic key to the quantum terminal;
  • the quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server transmits a user login (log-in) bi-directional tunneling data communication between the control server and the quantum terminal Is opened.
  • the PUF chip is mounted in a quantum terminal, the MCU in the quantum terminal generates unique PIN data, Stored in the platform memory;
  • the control server includes a pseudo random number generator and a platform memory.
  • the control server generates a random random number through a pseudo random number generator.
  • the control server generates a symmetric encryption key using PIN data stored in the platform memory.
  • the control server transmits the asymmetric cryptographic key to the quantum terminal;
  • the quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server logs in the user between the control server and the quantum terminal and transmits the bi-directional tunneling data And communication is started.
  • the remote server includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, Generates a remote symmetric encryption key with unique remote PIN data using physical process deviations occurring during the remote symmetric encryption process;
  • the remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key;
  • the remote symmetric encryption key is stored in a local server internal local memory;
  • the local server includes a local PUF chip, a local random number generator, a local memory, and a local controller.
  • the local controller generates unique local PIN data using physical process variations occurring during the manufacturing process of the local PUF chip, Generate an encryption key; Wherein the local control unit generates a random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key;
  • the local symmetric encryption key is stored in a remote server internal remote memory;
  • the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address;
  • the remote server receives the local asymmetric cryptographic key and transmits the remote cryptographic key, which is encrypted with the local asymmetric cryptographic key to the remote symmetric cryptographic key to the local server IP address, to the local server;
  • the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server Open; At the time of log-in, the local a
  • the remote server includes a remote PUF Chip, a remote random number generator, a remote memory, and a remote control unit.
  • the remote random number generator generates a remote symmetric encryption key Generate;
  • the remote control unit generates unique remote PIN data using a physical process deviation occurring during a manufacturing process of a remote PUF chip and generates a remote asymmetric encryption key by encrypting the remote symmetric encryption key;
  • the remote symmetric encryption key is stored in a local server internal local memory;
  • the local server comprises a local PUF Chip, a local random number generator, a local memory, and a local control, wherein the local random number generator generates a local symmetric encryption key;
  • the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key;
  • the local symmetric encryption key is stored in
  • the secure terminal comprises a quantum random number generator and a PUF PIN data generator
  • the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator
  • the quantum random detector detects quantum particles generated from a random number source generator that emits quantum particles
  • the quantum random pulse generator detects a quantum particle event from the quantum detection diode to detect quantum particles
  • the quantum random number control unit comprises a microprocessor for generating a random number from a random random number source generated through the quantum random pulse generator to generate a symmetric encryption key
  • the PUF PIN data generator comprises a PUF Chip and main part, and the main part is composed of PIN data of PUF chip Based features that create an asymmetric cryptographic encryption key to encrypt a symmetric encryption key that is generated by a quantum random number generator.
  • the secure terminal comprises a quantum random number generator and a PUF PIN data generator, wherein the PUF PIN data generator comprises a PUF chip and a main control unit, Generate a symmetric encryption key with the PIN data of the chip;
  • the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit, wherein the quantum detection diode detects quantum particles generated from a random number source generator emitting quantum particles, The generator generates a random pulse corresponding to the detection of the quantum particle by detecting a quantum particle event from the quantum detection diode, and the quantum random number control unit generates a quantum random number with a random random number source generated through the quantum random pulse generator; And the quantum random number control unit encrypts the symmetric cryptographic key with the quantum random number to encrypt and generate the asymmetric cryptographic key.
  • the remote USB includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, Generates a remote symmetric encryption key with unique remote PIN data using physical process deviations occurring during the remote symmetric encryption process;
  • the remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key;
  • the remote symmetric encryption key is stored in an operating server and a local USB internal local memory;
  • the local USB includes a local PUF chip, a local random number generator, a local memory, and a local controller.
  • the local controller generates unique local PIN data using physical process variations occurring during the manufacturing process of the local PUF chip, Generate an encryption key;
  • the local control unit generates a random random number through the local quantum random number generator to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key;
  • the local symmetric encryption key is stored in an operating server and a remote USB internal remote memory;
  • the operation server receives the local asymmetric encryption key and the remote asymmetric encryption key from the remote USB and local USB connected to the network, it decrypts the local symmetric encryption key and the remote symmetric encryption key,
  • the connection IP address of the local USB is transmitted through the remote USB
  • the connection IP address of the remote USB is transmitted by the local USB, so that bidirectional communication is performed through the local asymmetric encryption key and the remote asymmetric encryption key.
  • the security terminal includes a quantum random number generator and a PUF PIN data generator.
  • the PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip
  • the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number.
  • the security terminal includes a quantum random number generator and a PUF PIN data generator.
  • the quantum random number generator generates a symmetric cryptographic key with a random random number, generates a PUF PIN data generator,
  • the asymmetric cryptographic key is generated by encrypting the symmetric cryptographic key with the PIN data of the PUF chip.
  • the PUF chip generates PIN data using a physical process variation occurring in the manufacturing process to generate a symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; And generating the first asymmetric cryptographic key to the n-th asymmetric cryptographic key using a random number generated through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key.
  • the PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate the symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key;
  • the asymmetric cryptographic key generated by the pseudo random number generator includes a random number generated hash function in a newly generated asymmetric cryptographic key by generating an asymmetric cryptographic key through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key, Is stored.
  • the PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate the symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key;
  • the pseudo-random number generator generates a new pseudo-random number by generating a pseudo-random number as a random number generating hash function, and then generates a new asymmetric cryptographic key by encrypting the asymmetric cryptographic key.
  • the new asymmetric cryptographic key generated by the pseudo- And the asymmetric cryptographic key is newly stored in the asymmetric cryptographic key.
  • the Quantum Random Number Generator can be used as a True Random Number Generator (TRNG) or a Pseudo Random Number Generator (PRNG).
  • the single PIN data of the non-replicable physical PUF chip and the one-time OTP quantum cryptographic key using the random natural number of the quantum random number generator compared with the conventional security measures through a pair of VPNs, Directional tunneling data communication is opened only between the quantum terminal and the integrated control server by strengthening the security measures through application of the unidirectional cryptographic key for transmitting the data.
  • the PUF chip is mounted on the quantum terminal, And the PIN data is stored in the integrated control server internal platform memory.
  • the integrated control server comprises a quantum random number generator and a platform memory.
  • the quantum random number generator comprises a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit.
  • the random number source generator emits quantum particles
  • the quantum detection diode detects quantum particles generated from the random number source generator
  • the quantum random pulse generator detects a quantum particle event from the quantum detection diode to generate a random pulse corresponding to the detection of the quantum particle
  • the quantum random number control unit comprises a microprocessor, Generates a symmetric encryption key by generating a quantum random number from a pulse random number source, and encrypts the symmetric encryption key with PIN data stored in the platform memory to generate an asymmetric encryption key.
  • the integrated control server transmits the asymmetric cryptographic key to the MAC address of the quantum terminal modem chip, and the quantum terminal includes the modem chip, the MCU, the power amplifier, and the PUF chip.
  • the MCU receives the asymmetric cryptographic key through the modem chip
  • the power amplifier amplifies the MAC address of the modem chip and the PIN data of the PUF chip using the asymmetric cryptographic key, and transmits the amplified data to the integrated control server through the modem chip.
  • the integrated control server decrypts the data encrypted with the asymmetric cryptographic key with the symmetric cryptographic key
  • the user logs in between the integrated control server and the quantum terminal to open bi-directional tunneling data communication.
  • the quantum random number generator includes a random number source generator, a quantum detection diode, a quantum random pulse generator, a quantum random number controller, and an input / output unit.
  • the random number source generator includes a light emitting diode (LED) ), A radioisotope, a transistor noise, and a thermal noise, the quantum detection diode detects quantum particles generated from the random number source generator, and the quantum random pulse generator detects the quantum detection diode
  • the quantum random number generator generates a random number by generating a random random number from a random pulse random number source generated through the quantum random pulse generator to generate a symmetric encryption key, And a microprocessor.
  • the input / output unit includes a power supply port, an input data port, an output data port, and a grounding port.
  • the input / output unit integrates a protruding input / output unit coupled to the depressed input / output unit of the PUF PIN data generator 1 on a plate, And a protruding input / output unit including a power supply port, an input data port, an output data port, and a grounding port which are inserted into a recessed input / output unit of the quantum terminal, ; An input data port, an output data port, and a grounding port of the protruding input / output unit of the quantum random number generator; And a PUF PIN data generator 1 including an integrated housing including a PUF controller.
  • the PUF control unit When the protruding input / output unit of the PUF PIN data generator is inserted into the recessed input / output unit of the quantum terminal, the PUF control unit is powered by receiving power through a power port and a grounding port inside the quantum terminal, Output unit of the quantum random number generator is inserted into the PUF PIN data generator, the quantum random number controller is driven to receive power through the power port and the ground port in the PUF PIN data generator, and the quantum random number controller controls the random number generator A quantum detection diode, and a quantum random pulse generator, and transmits the generated symmetric cryptographic key to a PUF control unit in the PUF PIN data generator.
  • the PUF control unit controls the quantum random number generator Upon receipt of the symmetric encryption key from the random number generator, the symmetric cipher It encrypts the generated encrypt the asymmetric encryption key is characterized in that transmission to both devices.
  • the PUF controller generates a symmetric encryption key through the PIN data of the PUF chip, and the quantum random number generator generates the asymmetric encryption key by encrypting the symmetric encryption key with the quantum random number, and outputs the asymmetric encryption key to the input / output Output unit, and the input / output unit of the quantum random number generator comprises a protruding input / output unit and a depressed input / output unit.
  • VPN Virtual Private Network
  • MAC Address Media Access Control Address
  • IP Address Internet Protocol Address
  • connection server transmits the connection IP address of the remote server to the operation server connected to the network.
  • operation server connected to the network
  • the operation server transmits the connection IP address of the local server to the remote server and transmits the connection IP address of the remote server to the local server.
  • the connection IP address of the remote USB is transmitted to the operation server.
  • the operation server transmits the connection IP address of the local USB to the remote USB and transmits the connection IP address of the remote USB to the local USB.
  • the remote server When the remote server is connected to the network, the remote server transmits the connection IP address and remote PIN data of the remote server to the operation server connected to the network.
  • the local server connects to the network
  • the remote server transmits the connection IP address of the local server and the local server transmits the local IP address and the local PIN data to the connected operation server. And transmits the connection IP address of the remote server.
  • the remote server When the remote server is replaced with the remote USB and connected to the network, the remote server sends the remote USB connection IP address and remote PIN data to the operating server, and the local server replaces the local USB.
  • the remote server transmits the local IP address and local PIN data of the local USB to the operation server, and when the remote PIN data and the local PIN data are mutually user authenticated, the operation server transmits the local IP address of the local server to the remote server, And transmits the connection IP address of the remote server to the server.
  • the remote server and the local server are replaced with a USB (Universal Serial Bus) equipped with a microprocessor MCU (Micro Control Unit), the remote server is replaced with a remote USB, and the local server is replaced with a local USB .
  • USB Universal Serial Bus
  • MCU Micro Control Unit
  • the remote server can be replaced with a remote virtual private network (VPN), the local server can be replaced with a local virtual private network (VPN), and the remote server and the local server can be replaced with a microprocessor microcontroller (MCU) Board (Peripheral Component Interconnect Board), a remote server is replaced with a remote PCI board, and a local server is replaced with a local PCI board.
  • VPN virtual private network
  • MCU microprocessor microcontroller
  • MCU microcontroller
  • PCI board Peripheral Component Interconnect Board
  • USB Universal Serial Bus
  • PCI Board Peripheral Component Interconnect Board
  • a single PIN data of a non-replicable physical PUF chip and a random natural number of a quantum random number generator are compared with conventional security measures through a pair of VPNs Way tunneling data communication only between the CCTV video surveillance device and the integrated control server by enhancing the security measures by applying the one-way cryptographic key for transmitting the data only in one direction through the disposable OTP quantum cryptographic key, and the PUF chip is used for the CCTV video
  • the MCU in the CCTV video monitoring apparatus generates unique PIN data using a physical process variation occurring in the manufacturing process to generate a symmetric encryption key, and the symmetric encryption key generated through the PIN data It is stored in the internal platform memory of the integrated control server.
  • the integrated control server comprises a quantum random number generator and a platform memory
  • the quantum random number generator comprises a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number controller
  • the quantum random number generator detects a quantum particle event from the quantum detection diode to generate a random pulse corresponding to the detection of the quantum particle, and the quantum random number generator And generates a quantum random number by a random pulse random number source generated through the quantum random pulse generator.
  • the asymmetric cryptographic key is generated by encrypting the symmetric cryptographic key stored in the integrated control server internal platform memory with the quantum random number.
  • the integrated control server transmits the asymmetric cryptographic key to the MAC address of the CCTV video surveillance device, and the CCTV video surveillance device includes the modem chip, the MCU, the power amplifier, the PUF chip, and the surveillance camera.
  • the asymmetric cipher key is received, and the MAC address of the modem chip and the PIN data of the PUF chip are encrypted with the asymmetric cipher key, and the data is amplified by the power amplifier and transmitted to the integrated control server through the modem chip. If the user matches the PIN data of the PUF chip decrypted with the symmetric encryption key and the MAC address of the CCTV video monitoring device modem chip, the user logs in between the integrated control server and the CCTV video monitoring device and performs bidirectional tunneling And data communication is started.
  • a single PIN data of a non-replicable physical PUF chip and a random natural number of a quantum random number generator are compared with conventional security measures through a pair of VPNs
  • Directional cryptographic key that transmits data only in one direction through the disposable OTP quantum cryptographic key to strengthen the security measures and to open bi-directional tunneling data communication only between the CCTV video surveillance device and the integrated control server.
  • the PUF chip is mounted on the CCTV video monitoring device.
  • the MCU inside the CCTV video monitoring device generates the unique PIN data using the physical process variation occurring during the manufacturing process, and the PIN data is stored in the platform memory of the integrated control server do.
  • the integrated control server comprises a quantum random number generator and a platform memory.
  • the quantum random number generator consists of a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number controller.
  • the random number source generator emits quantum particles
  • the quantum detection diode detects quantum particles generated from the random number source generator
  • the quantum random pulse generator detects a quantum particle event from the quantum detection diode to detect quantum particles And generating a random number by generating a random random number from a random pulse random number source generated through the quantum random pulse generator to generate a symmetric encryption key
  • the integrated control server transmits the asymmetric cryptographic key to the MAC address of the CCTV video surveillance device, and the CCTV video surveillance device transmits the asymmetric cipher key to the modem chip, the MCU, the power amplifier, the PUF chip, And a surveillance camera, and the MCU receives the asymmetric cryptographic key through the modem chip and transmits the MAC Ad dress and PUF chip PIN data with the asymmetric encryption key is amplified by Power Amp and transmitted to the integrated control server through the modem chip and the integrated control server encrypts the data encrypted with the asymmetric encryption key by the symmetric encryption key
  • the user log-in is performed between
  • the remote server includes a remote PUF chip, a remote random number generator, a remote memory, a surveillance camera, and a remote control unit.
  • the remote control unit generates unique remote PIN data using a physical process variation occurring during a manufacturing process of a remote PUF chip to generate a remote symmetric encryption key and the remote control unit generates a random number through the remote random number generator, And encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key.
  • the remote PIN data is stored in the local server internal local memory.
  • the local server includes a local PUF chip, a local random number generator, a local memory, and a local control unit.
  • the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local symmetric encryption key.
  • the local control unit generates a random random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key.
  • the local PIN data is stored in a remote server internal remote memory.
  • the local server When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address.
  • the remote server receives the local asymmetric cryptographic key and transmits the remote PIN data encrypted with the local asymmetric cipher key to the local server using the local server IP address and the remote PIN data of the remote PUF chip.
  • the local server performs a log-in bi-directional operation between the local server and the remote server, Tunneling data communication is opened.
  • the remote PIN data encrypted with the local asymmetric encryption key and the local asymmetric encryption key is deleted.
  • the remote server When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server transmits the remote asymmetric encryption key to the local server IP address.
  • the local server receives the remote asymmetric cipher key and transmits the local PIN data, which is encrypted with the remote asymmetric cipher key, to the remote server using the remote server IP address and the local PIN data of the local PUF chip.
  • the remote server logs in (Log-in) between the remote server and the local server.
  • the tunneling data communication is opened and the image data is transmitted to the local server.
  • the remote asymmetric encryption key and the local PIN data encrypted with the remote asymmetric encryption key are deleted at the time of log-in.
  • a remote server includes a remote PUF chip, a remote random number generator, a remote memory, a surveillance camera, and a remote control unit.
  • the remote random number generator includes a remote PUF chip, a remote random number generator, Generates a symmetric encryption key.
  • the remote control unit generates unique remote PIN data using a physical process variation occurring during the manufacturing process of the remote PUF chip, and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key.
  • the remote symmetric encryption key is stored in a local memory inside the local server.
  • the local server includes a local PUF chip, a local random number generator, a local memory, and a local control unit.
  • the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip, and encrypts the local symmetric encryption key to generate a local asymmetric encryption key.
  • the local symmetric encryption key is stored in a remote server internal remote memory.
  • the local server When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address.
  • the remote server receives the local asymmetric cryptographic key and sends the remote cryptographic key, which is encrypted with the local symmetric cryptographic key to the remote symmetric cryptographic key, to the local server with the local server IP address.
  • the local server When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server It opens.
  • the local asymmetric encryption key and the remote encryption key are deleted.
  • the remote server When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server transmits the remote asymmetric encryption key to the local server IP address.
  • the local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server.
  • the remote server opens the log-in bi-directional tunneling data communication between the remote server and the local server And transmits the data to the local server.
  • the remote asymmetric encryption key and the local encryption key are deleted at the time of log-in.
  • the surveillance camera can be replaced with a water leakage sensor, a water meter, a heat meter, a gas meter, a wattage meter, a solar generator, a renewable energy generator, an electricity distribution panel, a broadcasting device, an automatic control panel and an automatic control server.
  • the present invention can be applied to a security system in object Internet communication. Bidirectional communication with both quantum security and PUF security is possible between any PC in the world connected to the Internet and a PC with remote USB and local USB.
  • CCTV IPTV camera water leakage sensor, water meter, heat meter, gas meter, energy meter, solar generator, renewable energy generator, switchboard, broadcasting device, automatic control panel, have.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

Selon la présente invention, des données PIN sont générées à l'aide d'une variation d'un processus physique se produisant durant un processus de fabrication d'une puce PUF pour générer une clé de chiffrement symétrique, et une clé de chiffrement asymétrique est générée via un chiffrement de la clé de chiffrement symétrique avec un nombre aléatoire quantique généré au moyen d'un générateur de nombre aléatoire quantique. La clé cryptographique asymétrique est à nouveau générée au moyen de l'un quelconque du générateur de nombre aléatoire quantique ou du générateur de nombre pseudo-aléatoire en plus de la clé cryptographique asymétrique, la clé cryptographique asymétrique générée par le générateur de nombres pseudo-aléatoires contenant une fonction de hachage à nombre aléatoire dans une clé cryptographique asymétrique nouvellement générée et étant stockée.
PCT/KR2018/013095 2017-10-31 2018-10-31 Système de terminal de sécurité cryptographique quantique puf-qrng, et procédé de génération de clé cryptographique WO2019088689A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020170142982A KR101888629B1 (ko) 2017-10-31 2017-10-31 Puf-qrng 보안단말기 시스템
KR10-2017-0142982 2017-10-31

Publications (1)

Publication Number Publication Date
WO2019088689A1 true WO2019088689A1 (fr) 2019-05-09

Family

ID=63719719

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2018/013095 WO2019088689A1 (fr) 2017-10-31 2018-10-31 Système de terminal de sécurité cryptographique quantique puf-qrng, et procédé de génération de clé cryptographique

Country Status (2)

Country Link
KR (1) KR101888629B1 (fr)
WO (1) WO2019088689A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134688A (zh) * 2020-09-22 2020-12-25 广东海洋大学 一种基于量子混沌映射与sha-3的非对称图像加密方法
CN112398894A (zh) * 2019-08-19 2021-02-23 广州汽车集团股份有限公司 车用的安全验证方法及装置
CN112528257A (zh) * 2020-12-04 2021-03-19 百度在线网络技术(北京)有限公司 安全调试方法、装置、电子设备及存储介质
CN113114474A (zh) * 2021-04-17 2021-07-13 中科启迪光电子科技(广州)有限公司 一种基于芯片原子钟的量子时频密码生成识别方法
WO2021226596A1 (fr) * 2020-05-08 2021-11-11 Wane Brian Utilisation d'application de clavier pour crypter du courrier électronique et d'autres données numériques
CN113950049A (zh) * 2021-09-28 2022-01-18 天翼物联科技有限公司 基于sim卡的物联网量子安全方法、系统、装置及介质
US11245519B1 (en) * 2019-10-04 2022-02-08 Wells Fargo Bank, N.A. Systems and methods for quantum entanglement random number generation
CN114124370A (zh) * 2021-10-14 2022-03-01 阿里云计算有限公司 密钥生成方法及装置
US20220246538A1 (en) * 2018-12-26 2022-08-04 Sony Semiconductor Solutions Corporation Circuit board, semiconductor apparatus, and electronic equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102054256B1 (ko) * 2019-01-11 2019-12-10 주식회사 에너닷 Ami 디바이스와 ami 디바이스 무결성 검증 시스템 및 무결성 검증 방법
KR102239683B1 (ko) * 2019-10-23 2021-04-13 주식회사 에너닷 Ami 디바이스와 ami 디바이스 무결성 검증 시스템 및 무결성 검증 방법

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090262926A1 (en) * 2008-04-16 2009-10-22 Infineon Technologies Ag Method and apparatus for generating a cryptographic key
KR101495448B1 (ko) * 2013-10-29 2015-02-26 (주) 아이씨티케이 사용자 인증을 위한 ic 칩 및 인증 방법
WO2015056236A1 (fr) * 2013-10-17 2015-04-23 Andre Keith Joubert Procédé de génération de réseaux de clés de nombres aléatoires et de chiffrement
KR20160091108A (ko) * 2015-01-23 2016-08-02 서울시립대학교 산학협력단 양자암호를 이용하여 보안 기능을 강화한 안전 결제 및 안전 인증 시스템
KR101767067B1 (ko) * 2014-12-09 2017-08-11 한국과학기술원 양자 암호 키 분배 방법, 장치 및 시스템

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090262926A1 (en) * 2008-04-16 2009-10-22 Infineon Technologies Ag Method and apparatus for generating a cryptographic key
WO2015056236A1 (fr) * 2013-10-17 2015-04-23 Andre Keith Joubert Procédé de génération de réseaux de clés de nombres aléatoires et de chiffrement
KR101495448B1 (ko) * 2013-10-29 2015-02-26 (주) 아이씨티케이 사용자 인증을 위한 ic 칩 및 인증 방법
KR101767067B1 (ko) * 2014-12-09 2017-08-11 한국과학기술원 양자 암호 키 분배 방법, 장치 및 시스템
KR20160091108A (ko) * 2015-01-23 2016-08-02 서울시립대학교 산학협력단 양자암호를 이용하여 보안 기능을 강화한 안전 결제 및 안전 인증 시스템

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220246538A1 (en) * 2018-12-26 2022-08-04 Sony Semiconductor Solutions Corporation Circuit board, semiconductor apparatus, and electronic equipment
CN112398894A (zh) * 2019-08-19 2021-02-23 广州汽车集团股份有限公司 车用的安全验证方法及装置
CN112398894B (zh) * 2019-08-19 2022-05-24 广州汽车集团股份有限公司 车用的安全验证方法及装置
US11245519B1 (en) * 2019-10-04 2022-02-08 Wells Fargo Bank, N.A. Systems and methods for quantum entanglement random number generation
US12010224B2 (en) 2019-10-04 2024-06-11 Wells Fargo Bank, N.A. Systems and methods for quantum entanglement random number generation
WO2021226596A1 (fr) * 2020-05-08 2021-11-11 Wane Brian Utilisation d'application de clavier pour crypter du courrier électronique et d'autres données numériques
US11563725B2 (en) 2020-05-08 2023-01-24 Brian Wane Using keyboard app to encrypt e-mail and other digital data
US20230164126A1 (en) * 2020-05-08 2023-05-25 Brian Wane Encrypting E-mail and Other Digital Data Using Quantum Random Number Generator
CN112134688A (zh) * 2020-09-22 2020-12-25 广东海洋大学 一种基于量子混沌映射与sha-3的非对称图像加密方法
CN112134688B (zh) * 2020-09-22 2023-10-31 广东海洋大学 一种基于量子混沌映射与sha-3的非对称图像加密方法
CN112528257B (zh) * 2020-12-04 2023-08-01 百度在线网络技术(北京)有限公司 安全调试方法、装置、电子设备及存储介质
CN112528257A (zh) * 2020-12-04 2021-03-19 百度在线网络技术(北京)有限公司 安全调试方法、装置、电子设备及存储介质
CN113114474A (zh) * 2021-04-17 2021-07-13 中科启迪光电子科技(广州)有限公司 一种基于芯片原子钟的量子时频密码生成识别方法
CN113950049A (zh) * 2021-09-28 2022-01-18 天翼物联科技有限公司 基于sim卡的物联网量子安全方法、系统、装置及介质
CN113950049B (zh) * 2021-09-28 2023-10-03 天翼物联科技有限公司 基于sim卡的物联网量子安全方法、系统、装置及介质
CN114124370A (zh) * 2021-10-14 2022-03-01 阿里云计算有限公司 密钥生成方法及装置

Also Published As

Publication number Publication date
KR101888629B1 (ko) 2018-09-20

Similar Documents

Publication Publication Date Title
WO2019088689A1 (fr) Système de terminal de sécurité cryptographique quantique puf-qrng, et procédé de génération de clé cryptographique
WO2013025060A2 (fr) Dispositif et procédé pour l'authentification de sécurité entre dispositifs basée sur une puf lors de la communication entre machines
WO2014175538A1 (fr) Appareil permettant d'utiliser un otp matériel basé sur puf et procédé permettant une authentification à 2 facteurs l'utilisant
WO2014069783A1 (fr) Procédé d'authentification par mot de passe et appareil pour l'exécuter
WO2021095998A1 (fr) Procédé et système informatiques sécurisés
WO2018151390A1 (fr) Dispositif de l'internet des objets
WO2014030911A1 (fr) Appareil et procédé pour le traitement de données d'authentification
WO2023163509A1 (fr) Système de commande de connexion de réseau reposant sur un dispositif de commande et procédé associé
WO2013048111A2 (fr) Procédé et appareil de détection d'une intrusion dans un service informatique en nuage
WO2012111872A1 (fr) Dispositif de chiffrement et procédé de défense contre une attaque physique
WO2020050424A1 (fr) SYSTÈME ET PROCÉDÉ BASÉS SUR UNE CHAÎNE DE BLOCS POUR UNE AUTHENTIFICATION DE SÉCURITÉ MULTIPLE ENTRE UN TERMINAL MOBILE ET UN DISPOSITIF D'IdO
WO2015012667A1 (fr) Dispositif et procédé de test du caractère aléatoire
WO2023146308A1 (fr) Système de commande d'accès au réseau sur la base d'un contrôleur, et procédé associé
WO2013086758A1 (fr) Système et procédé de chiffrement et d'authentification ethernet
WO2020186775A1 (fr) Procédé, appareil et dispositif de fourniture de données de service, et support de stockage lisible par ordinateur
WO2019132270A1 (fr) Procédé de communication sécurisé dans un environnement nfv et système associé
WO2016095339A1 (fr) Procédé de mise à jour de données de base dans un jeton dynamique
WO2023163514A1 (fr) Système de commande d'accès au réseau basé sur un dispositif de commande et procédé associé
WO2017111483A1 (fr) Dispositif d'authentification basée sur des données biométriques, serveur de commande et serveur d'application relié à celui-ci, et procédé de commande associé
WO2020122368A1 (fr) Système et procédé de sécurisation et de gestion de données dans un dispositif de stockage au moyen d'un terminal sécurisé
KR20190049006A (ko) Puf-qrng 원격검침 감시 단말기
WO2020242062A1 (fr) Dispositif de transmission de données de clé à un abonné faisant partie d'un groupe de multidiffusion
WO2021020918A1 (fr) Procédé de production d'un réseau interne logique, et terminal mobile et application pour la mise en œuvre d'un tel réseau
WO2023211121A1 (fr) Système de commande d'émission et de réception de fichier d'application sur la base d'un proxy, et procédé associé
WO2018199637A1 (fr) Système d'authentification de sécurité quantique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18874658

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18874658

Country of ref document: EP

Kind code of ref document: A1