WO2019223624A1 - 密钥分发方法及终端设备 - Google Patents

密钥分发方法及终端设备 Download PDF

Info

Publication number
WO2019223624A1
WO2019223624A1 PCT/CN2019/087465 CN2019087465W WO2019223624A1 WO 2019223624 A1 WO2019223624 A1 WO 2019223624A1 CN 2019087465 W CN2019087465 W CN 2019087465W WO 2019223624 A1 WO2019223624 A1 WO 2019223624A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
chaotic
superlattice
output signal
digital
Prior art date
Application number
PCT/CN2019/087465
Other languages
English (en)
French (fr)
Inventor
刘伟
张耀辉
殷志珍
宋贺伦
刘佩华
Original Assignee
中国科学院苏州纳米技术与纳米仿生研究所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国科学院苏州纳米技术与纳米仿生研究所 filed Critical 中国科学院苏州纳米技术与纳米仿生研究所
Publication of WO2019223624A1 publication Critical patent/WO2019223624A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators

Definitions

  • the present invention relates to the field of information security technology, and in particular, to a key distribution method and a terminal device.
  • Encryption technology can be roughly divided into two categories: symmetric encryption and asymmetric encryption.
  • Symmetric encryption is the earliest and most widely used encryption technology.
  • Asymmetric encryption uses a pair of keys, a public key and a private key. Among them, the private key can only be kept by the decryptor, not public, and the public key can be published publicly. Any encryptor who wants to send information to the decryptor can obtain the public key from the public channel and use the public key to encrypt the information. The decryptor can decrypt the encrypted information by virtue of the private key.
  • the disadvantage of asymmetric encryption is that the amount of calculation is very large, so it is only suitable for encrypting very small data. For large amounts of data, symmetric encryption is still required.
  • the main purpose of the present invention is to provide a key distribution method and a terminal device to improve the security of symmetric encryption and the convenience of symmetric encryption key distribution.
  • a key distribution method provided by the present invention includes the following steps:
  • the first terminal downloads the public noise source PNS from the public channel and saves it to obtain the local noise source LNSA;
  • the first terminal uses the local noise source LNSA to drive a superlattice chaotic device to obtain a superlattice chaotic output signal COA;
  • the first terminal performs analog-to-digital conversion on the superlattice chaotic output signal COA to obtain a chaotic output signal DCOA in a digital form;
  • the first terminal performs security sketch processing on the digital form chaotic output signal DCOA to generate auxiliary data HA;
  • the present invention also proposes a key distribution method, which includes steps:
  • the second terminal downloads the public noise source PNS from the public channel and saves it to obtain the local noise source LNSB;
  • the second terminal uses the local noise source LNSB to drive a superlattice chaotic device to obtain a superlattice chaotic output signal COB;
  • the second terminal uses the DCOB and the auxiliary data HB to perform data reconstruction on the chaotic output signal DCOA in digital form in the first terminal to obtain a reconstructed chaotic output signal RDCOA in digital form;
  • the second terminal uses the reconstructed digital form of the chaotic output signal RDCOA to generate a random key KB for decrypting the encrypted data received from the first terminal.
  • the present invention further provides a terminal device, which includes the memory, a digital-to-analog conversion module, a superlattice chaotic device, an analog-to-digital conversion module, a digital post-processing module, and a symmetric encryption module. , Communication module, and security sketch module, the terminal device performs the following steps for confidential communication:
  • analog-to-digital conversion module to perform analog-to-digital conversion according to the superlattice chaotic output signal COA to obtain a chaotic output signal DCOA in a digital form;
  • the present invention further provides a terminal device, which includes the memory, a digital-to-analog conversion module, a superlattice chaotic device, an analog-to-digital conversion module, a digital post-processing module, and a symmetric encryption module.
  • a communication module, and a data reconstruction module when the terminal device performs confidential communication, the following steps are performed:
  • the advantages of the asymmetric encryption technology and the symmetric encryption technology can be combined, and the sender and the receiver of the communication realize the key distribution, and respectively obtain the same random key KA and KB, so if the sender uses KA to encrypt the data, the receiver can use KB to decrypt the data.
  • This method only needs to transmit the public noise source PNS and public auxiliary data PH on the public channel.
  • an attacker cannot infer from the PNS that the sender and receiver use the PNS to drive the superlattice chaotic output signals COA and COB generated by the superlattice chaotic device.
  • the attacker cannot infer the chaotic output signal DCOA in digital form from the public auxiliary data PH. Therefore, transmitting the public noise source PNS and public auxiliary data PH on the public channel will not affect the security of the random keys KA and KB.
  • FIG. 1 is a schematic diagram of an optional application environment of each embodiment of the present invention.
  • FIG. 2 is an architecture diagram of a terminal device according to a first embodiment of the present invention
  • 3 and 4 are flowcharts of a key distribution method according to a second embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a processing process from a local noise source to a random key in the key distribution method
  • FIG. 7 is a flowchart of another embodiment of the key distribution method.
  • FIG. 1 is a schematic diagram of an optional application environment according to various embodiments of the present invention.
  • the present invention can be applied to a symmetric encryption system 1 including, but not limited to, a public channel 11, a first terminal 12, and a second terminal 13.
  • the symmetric encryption system 1 is used for information transmission through symmetric encryption technology.
  • the public channel 11 may be an optical fiber, a broadband fixed network, a mobile network, an optical disc, a mobile hard disk, or the like, and is used to perform public noise sources, auxiliary data release, and information transmission.
  • the first terminal 12 and the second terminal 13 may be fixed or movable terminal devices with information transmission and encryption / decryption functions, and perform communication connection through the public channel 11.
  • the first terminal 12 and the second terminal 13 are respectively used as two parties for information transmission.
  • the sender is used to encrypt and send information
  • the receiver is used to receive and decrypt information.
  • the first terminal 12 is a sender
  • the second terminal 13 is a receiver.
  • the second terminal 13 may also be used as the sender
  • the first terminal 12 may be used as the receiver.
  • the second terminal 13 may send information to the first terminal 12 in the same manner. .
  • a first embodiment of the present invention provides a terminal device 2. It can be understood that the terminal device 2 may be the first terminal 12 or the second terminal 13 described above.
  • the terminal device 2 includes a memory 20, a digital-to-analog conversion module 21, a superlattice chaotic device 22, an analog-to-digital conversion module 23, a digital post-processing module 24, a symmetric encryption module 25, a communication module 26, a secure sketch module 27, and data reconstruction. Module 28.
  • the memory 20 includes at least one type of readable and writable storage medium for storing a local noise source and other data and programs required for the normal operation of the terminal.
  • the memory 20 may also be used to temporarily store various types of data that have been output or will be output.
  • the digital-to-analog conversion module 21 is configured to convert a local noise source stored in digital form into a noise signal in analog form to drive the superlattice chaotic device 22.
  • the superlattice chaotic device 22 is used to generate a chaotic output signal in an analog form driven by a local noise signal in an analog form.
  • the chaotic output signal is a true random analog signal.
  • the analog-to-digital conversion module 23 is configured to convert a chaotic output signal in an analog form into a chaotic output signal in a digital form.
  • the digital post-processing module 24 is configured to process the chaotic output signal in the digital form (or the chaotic output signal in the reconstructed digital form) to generate a random key.
  • the symmetric encryption module 25 is used for symmetric encryption or decryption of data to be transmitted by using the random key.
  • the plaintext can be encrypted to obtain a ciphertext, or the ciphertext can be decrypted to obtain a plaintext. If the random keys used for encryption and decryption are the same, the decrypted plaintext is the same as the original plaintext.
  • the communication module 26 is configured to perform symmetric encrypted information (ciphertext) transmission between a sender and a receiver.
  • the security sketching module 27 is applied to the first terminal 12 as a sender, and is configured to process the chaotic output signal in digital form through security sketching to generate auxiliary data.
  • the communication module 26 is further configured to publish the auxiliary data to the public channel 11.
  • the data reconstruction module 28 is applied to the second terminal 13 as a receiver, and is configured to generate a reconstructed digital chaotic output signal by using the digital chaotic output signal and auxiliary data as inputs.
  • the first terminal 12 and the second terminal 13 download a public noise source from a public channel and save the local noise source.
  • a public noise source PNS may be generated by the first terminal 12, the second terminal 13, or a third party, and then published by the generator of the PNS to the public channel 11.
  • the communication modules 26 of the first terminal 12 and the second terminal 13 respectively download the public noise source PNS to the local, save it to the memory 20, and become the local noise sources LNSA and LNSB.
  • the first terminal 12 and the second terminal 13 respectively use the local noise source to convert into analog signals through the digital-to-analog conversion module 21, and drive the superlattice chaotic device 22 to obtain a superlattice chaotic output signal.
  • the first terminal 12 and the second terminal 13 respectively read the random binary digital sequences contained in the local noise sources LNSA and LNSB, and then convert them into a noise signal in the form of an analog signal through the digital-to-analog conversion module 21, and drive with the noise signal.
  • the local superlattice chaotic device 22 obtains the superlattice chaotic output signals COA (Chaotic Output A) and COB (Chaotic output Output B).
  • the superlattice chaotic output signal is a true random analog signal.
  • the superlattice chaotic devices 22 in the first terminal 12 and the second terminal 13 must be matched superlattice chaotic devices 22.
  • the so-called matched superlattice chaotic device 22 refers to that these superlattice chaotic devices 22 have the same structure, the same manufacturing process, and are located adjacent to the same semiconductor wafer when they are manufactured, and have extremely similar physical properties and operating characteristics.
  • the superlattice chaotic device 22 included in the first terminal 12 and the second terminal 13 can be used as the identification identifiers of the two parties in the confidential communication, so the problems of identification and authentication of the two parties of the confidential communication are automatically solved.
  • the number of paired superlattice chaotic devices 22 is controlled by the producer of the cryptographic device, and can be two or more.
  • paired superlattice chaotic devices 22 If there are multiple paired superlattice chaotic devices 22 sent to multiple communication parties, multiple parties can be completed. Encrypted communication.
  • the key distribution method described in this embodiment is applicable to each of multiple parties.
  • These paired superlattice chaotic devices 22 cannot be copied, which is determined by the manufacturing and operating principles of the superlattice chaotic devices 22. Therefore, except for the limited pair of superlattice chaotic devices 22 controlled by the producer of the cryptographic device described above, an attacker cannot obtain a matched superlattice chaotic device 22.
  • the first terminal 12 and the second terminal 13 are converted into digital form chaotic output signals DCOA (Digital Chaotic Output A) and digital chaos output signals according to the superlattice chaotic output signals COA and COB, respectively.
  • DCOB Digital Chaotic Output B
  • the digital chaos output signal DCOA in the first terminal 12 is processed by the digital post-processing module 24 to generate a random key KA (KeyA). Therefore, the random key KA can be used to encrypt the plaintext P through the symmetric encryption module 25 to obtain the ciphertext C.
  • the communication module 26 then sends the ciphertext C to the second terminal 13 through the public channel 11.
  • auxiliary data HA Help Data A
  • the auxiliary data HA does not leak information about DCOA, so it can be transmitted through the open channel 11.
  • the communication module 26 of the first terminal 12 In order to distribute the key KA generated by the first terminal 12 to the second terminal 13, the communication module 26 of the first terminal 12 also releases the generated auxiliary data HA to the public channel 11, which is called public Auxiliary data PH.
  • the data reconstruction module 28 in the second terminal 13 has an error correction function, and uses both the digital chaotic output signal DCOB and the auxiliary data HB as inputs to generate a reconstructed digital chaotic output signal RDCOA (Reconstructed Digital Chaotic Output A).
  • the reconstructed digital form of the chaotic output signal RDCOA in the second terminal 13 is processed by a digital post-processing module 24 to generate a random key KB (Key B).
  • the symmetric encryption module 25 in the second terminal 13 uses the random key KB to decrypt the ciphertext C, and the original plaintext P can be obtained.
  • the terminal device 2 may further include other necessary components, or a combination of some components, or a different component arrangement.
  • FIG. 3 is a key generation process of the key distribution method
  • FIG. 4 is a key reconstruction process of the key distribution method.
  • the key generation process and the key reconstruction process jointly implement the key distribution function.
  • the execution order of the steps in the flowcharts shown in FIG. 3 and FIG. 4 may be changed, and some steps may be omitted.
  • the key generation process of the method includes the following steps:
  • the first terminal 12 downloads the public noise source from the public channel 11 and saves the local noise source LNSA.
  • the keys generated by the first terminal 12 and the second terminal 13 are the same in the following, so that no key needs to be transferred between the sender and the receiver, it is necessary to ensure that the first terminal 12 and the first terminal 12 The values of the local noise sources used by the two terminals 13 are equal. This is ensured by the first terminal 12 and the second terminal 13 receiving the public noise source PNS sent from the public channel 11 respectively.
  • a public noise source PNS may be generated by the first terminal 12, the second terminal 13, or a third party, and then published by the generator of the PNS to the public channel 11.
  • the first terminal 12 uses the local noise source to drive the superlattice chaotic device 22 to obtain a superlattice chaotic output signal COA.
  • the manager of the encrypted communication will send the first terminal and the second terminal respectively including the matched first superlattice chaotic device and the second superlattice chaotic device to the sender and receiver of the communication, respectively.
  • the superlattice chaotic device and the second superlattice chaotic device can be used as the identity and authentication identification of the sender and receiver for confidential communication, respectively.
  • the first terminal 12 reads a random binary digital sequence contained in the local noise source LNSA, and after digital-to-analog conversion, converts it into a noise signal in the form of an analog signal, and drives the local superlattice chaotic device 22 with this noise signal to obtain
  • the superlattice chaotic output signal COA is a true random analog signal.
  • the first terminal 12 obtains a chaotic output signal DCOA in digital form through analog-to-digital conversion according to the superlattice chaotic output signal COA.
  • the digital chaotic output signal DCOA in the first terminal 12 is subjected to digital post-processing to generate a random key KA, so that the random key KA can be used for symmetric encrypted information transmission.
  • FIG. 5 is a schematic diagram of a processing process from the local noise source to the random key.
  • the random binary digital sequence contained in the local noise source is converted into a noise signal in the form of an analog signal after digital-to-analog conversion.
  • the local super-lattice chaotic device 22 is driven by the noise signal to obtain a super-lattice chaotic output signal.
  • the super-lattice chaotic output signal is a true random analog signal. After the true random analog signal is sampled and analog-to-digital converted, a true random digital signal sequence can be obtained.
  • the true random digital signal sequence can be used as a true random key after digital post-processing.
  • the chaotic output signal DCOA in the digital form in the first terminal 12 is processed by a security sketch to generate auxiliary data, and is released to the public channel 11.
  • the superlattice chaotic output signals generated in the first terminal 12 and the second terminal 13 are very similar.
  • the chaotic output signals in the digital form generated in the first terminal 12 and the second terminal 13 are not completely the same due to interference from quantization noise of the analog-to-digital conversion, jitter of the sampling clock, and environmental noise and other noises.
  • the auxiliary data can solve this problem.
  • the communication module 26 of the first terminal 12 In order to distribute the key KA generated by the first terminal 12 to the second terminal 13, the communication module 26 of the first terminal 12 also releases the generated auxiliary data HA to the public channel 11, which is called public Auxiliary data PH. Even if the attacker obtains the public auxiliary data PH from the public channel 11, he cannot reversely deduce the chaotic output signal DCOA in the digital form.
  • the key reconstruction process of the method includes the following steps:
  • the second terminal 13 downloads the public noise source from the public channel 11 and saves the local noise source LNSB.
  • the first terminal 12 and the second terminal 13 respectively download the public noise source PNS to a local and save them as local noise sources LNSA and LNSB.
  • the public noise source PNS is used to provide excitation for subsequent superlattice noise sources, but there is no definite correlation between the output of the public noise source and the output of the superlattice chaotic output signal. Therefore, the requirement for public noise sources is only that it has certain white noise characteristics, and does not require very good randomness. Moreover, since there is no correlation between the output of the public noise source and the output of the superlattice chaotic output signal, the public noise source can be propagated through the public channel 11 without fear of cracking the superlattice chaotic output signal after being intercepted. characteristic.
  • the local noise sources LNSA and LNSB are digital copies of PNS, respectively, and are numerically identical. The difference is only in physical location, LNSA is located at the first terminal 12, and LNSB is located at the second terminal 13. Office.
  • the first terminal 12 and the second terminal 13 may not be in the same place, and may be distributed in two places at any distance, as long as the first terminal 12 and the second terminal 13 can respectively receive the public noise source PNS. Signal.
  • the public noise source and the local noise source are a random binary number sequence, and the random binary number sequence only needs to have a certain randomness, and does not necessarily need to be physically true random.
  • a pseudo-random number generation algorithm can be used to generate a pseudo-random number sequence. By changing this random binary digit sequence, the subsequent random key can be changed.
  • the subsequent random key generation process even if the public noise source is acquired by an attacker, the random keys of the first terminal 12 and the second terminal 13 cannot be inferred.
  • the second terminal 13 uses the local noise source to drive the superlattice chaotic device 22 to obtain a superlattice chaotic output signal COB.
  • the second terminal 13 reads out a random binary digital sequence included in the local noise source LNSB, converts it into a noise signal in the form of an analog signal through digital-to-analog conversion, and drives the local superlattice chaotic device with this noise signal. 22. Obtain a superlattice chaotic output signal COB, which is a true random analog signal.
  • the superlattice chaotic device 22 in the first terminal 12 and the second terminal 13 must be a matched superlattice chaotic device 22. Driven by a local noise signal, synchronous chaotic oscillation will occur. This oscillation is a This kind of physical true random effect, the oscillation signal produced by it is a true random signal. Moreover, since LNSA and LNSB are the same, the true random signals generated in this case are also extremely similar (the two signals may be offset in time).
  • the so-called matched superlattice chaotic device 22 refers to that these superlattice chaotic devices 22 have the same structure, the same manufacturing process, and are located adjacent to the same semiconductor wafer when they are manufactured, and have extremely similar physical properties and operating characteristics.
  • the superlattice chaotic device 22 included in the first terminal 12 and the second terminal 13 can be used as the identification identifiers of the two parties in the confidential communication, so the problems of identification and authentication of the two parties of the confidential communication are automatically solved.
  • the number of paired superlattice chaotic devices 22 is controlled by the producer of the cryptographic device, and can be two or more. If there are multiple paired superlattice chaotic devices 22 sent to multiple communication parties, multiple parties can be completed. Encrypted communication.
  • the key distribution method described in this embodiment is applicable to each of multiple parties. These paired superlattice chaotic devices 22 cannot be copied, which is determined by the manufacturing and operating principles of the superlattice chaotic devices 22. Therefore, except for the limited pair of superlattice chaotic devices 22 controlled by the producer of the cryptographic device described above, an attacker cannot obtain a matched superlattice chaotic device 22.
  • the local superlattice chaotic device 22 matched with the first terminal 12 and the second terminal 13 has physical unclonable characteristics, it is only possible to match the local superlattice chaotic device with the first terminal 12 and the second terminal 13 22 Obtained when making the same batch. In addition, it is impossible to obtain a superlattice chaotic device that matches the first terminal 12 and the second terminal 13. Therefore, even if an attacker intercepts a public noise source, it cannot generate the first terminal 12 and the first terminal 12. The two terminals 13 have the same key. Therefore, the public noise source can be transmitted on the public channel without having to worry about copying the same key as the first terminal 12 and the second terminal 13 after being intercepted.
  • the second terminal 13 obtains a chaotic output signal DCOB in digital form through analog-to-digital conversion according to the superlattice chaotic output signal COB.
  • the second terminal 13 downloads auxiliary data from the public channel 11, and obtains a reconstructed chaotic output signal RDCOA in digital form after data reconstruction.
  • DCOB is similar to DCOA, but not exactly the same. As long as the Hamming distance between DCOB and DCOA does not exceed the preset allowable maximum Hamming distance HDMAX, a reconstructed RDCOA can be obtained.
  • HDMAX can be adjusted according to the actual Hamming distance of DCOB and DCOA to ensure completely accurate data reconstruction.
  • the reconstructed digital form of the chaotic output signal RDCOA in the second terminal 13 is subjected to digital post-processing to generate a random key KB to decrypt the symmetric encrypted information transmitted by the first terminal 12.
  • the symmetric encrypted information transmission specifically includes steps:
  • the first terminal 12 encrypts the plaintext P by using the random key KA to obtain the ciphertext C.
  • the first terminal 12 uses the generated random key KA to encrypt the plaintext P of the information to be encrypted to obtain the ciphertext C.
  • the first terminal 12 sends the ciphertext C to the second terminal 13.
  • the first terminal 12 sends the encrypted cipher text C to the second terminal 13 through the public channel 11.
  • the second terminal 13 receives the ciphertext C sent by the first terminal 12.
  • the second terminal 13 receives the ciphertext C from the public channel 11.
  • the second terminal 13 decrypts the ciphertext C by using the random key KB to obtain the plaintext P.
  • This method combines the advantages of asymmetric encryption technology (no need to transmit a key) and the advantages of symmetric encryption technology (high performance), and is suitable for information transmission with a large amount of data.
  • FIG. 7 is a flowchart of another embodiment of the key distribution method. The specific steps in this flowchart are similar to the above steps, and are not repeated here.
  • the key distribution method proposed in this embodiment can combine the advantages of asymmetric encryption technology and symmetric encryption technology, and the sender and receiver of communication realize the distribution of keys, and obtain the same random keys KA and KB, respectively. Therefore, if the sender uses KA to encrypt the data, the receiver can use KB to decrypt the data.
  • the method only needs to transmit the public noise source PNS and the public auxiliary data PH on the public channel 11. According to the working principle of the superlattice chaotic device 22, an attacker cannot infer from the PNS that the sender and receiver use the PNS to drive the superlattice chaotic output signals COA and COB generated by the superlattice chaotic device 22.
  • the attacker cannot also infer the chaotic output signal DCOA in digital form from the public auxiliary data PH. Therefore, transmitting the public noise source PNS and public auxiliary data PH on the public channel 11 does not affect the security of the random keys KA and KB.
  • sequence numbers of the foregoing embodiments of the present invention are merely for description, and do not represent the superiority or inferiority of the embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种密钥分发方法,该方法包括:第一终端从公开信道中下载公开噪声源PNS,保存得到本地噪声源LNSA;所述第一终端利用LNSA驱动超晶格混沌器件,得到超晶格混沌输出信号COA;所述第一终端对COA进行模数转换得到数字形式的混沌输出信号DCOA;所述第一终端对所述DCOA经过安全素描处理,产生辅助数据HA,并发布至所述公开信道,得到公开辅助数据PH以供第二终端下载。本发明实施例还公开了一种终端设备。由此,能够利用超晶格混沌器件完成高速、便捷、安全的密钥分发。

Description

密钥分发方法及终端设备 技术领域
本发明涉及信息安全技术领域,尤其涉及一种密钥分发方法及终端设备。
背景技术
信息安全是信息社会的根本性要求,尤其进入21世纪以来,随着互联网金融、移动支付、移动办公、云计算等业务的发展,更加凸显出信息安全的重要性。为了保护关键业务数据,现代通信系统都不同程度使用了加密技术。加密技术大体上可以分为两类:对称加密和非对称加密。对称加密是最早出现,也是用得最多的加密技术。具体的对称加密算法有很多种,每种都各有特色,但都具备对称加密的核心特征,即加密和解密使用的密钥是相同的。这就带来了对称加密技术的一个根本性缺点,即用于加密和解密的密钥需要分发,即需要将加密者使用的密钥也分发给解密者。在密钥分发的过程中,就存在安全隐患,有被攻击者获取密钥的可能。
以上对称加密的缺陷,导致出现了非对称加密技术。非对称加密使用了一对密钥,即一个公钥和一个私钥。其中,私钥只能由解密者保存,不可公开,而公钥则可以公开发表。任何想要给解密者发送信息的加密者都可以从公开渠道获取该公钥,并用公钥加密信息,解密者凭借私钥就可以解密所述加密信息。然而,非对称加密的缺点是计算量非常大,因此只适合用来加密非常小的数据,对于大量的数据,还是需要使用对称加密。
发明内容
本发明的主要目的在于提出一种密钥分发方法及终端设备,以提高对称加密的安全性和对称加密秘钥分发的便捷性。
为实现上述目的,本发明提供的一种密钥分发方法,该方法包括步骤:
第一终端从公开信道中下载公开噪声源PNS,保存得到本地噪声源LNSA;
所述第一终端利用所述本地噪声源LNSA驱动超晶格混沌器件,得到超晶格混沌输出信号COA;
所述第一终端对所述超晶格混沌输出信号COA进行模数转换,得到数字形式的混沌输出信号DCOA;
所述第一终端对所述数字形式的混沌输出信号DCOA进行安全素描处理,产生辅助数据HA;
所述第一终端将所述辅助数据HA发布至所述公开信道,得到公开辅助数据PH,其中HA=PH。
此外,为实现上述目的,本发明还提出一种密钥分发方法,该方法包括步骤:
第二终端从公开信道中下载公开噪声源PNS,保存得到本地噪声源LNSB;
所述第二终端利用所述本地噪声源LNSB驱动超晶格混沌器件,得到超晶格混沌输出信号COB;
所述第二终端对所述超晶格混沌输出信号COB进行模数转换,得到数字形式的混沌输出信号DCOB;
所述第二终端从所述公开信道中下载第一终端发送的公开辅助数据PH,保存得到本地的辅助数据HB,且HB=PH;
所述第二终端利用所述DCOB和辅助数据HB对所述第一终端中的数字形式的混沌输出信号DCOA进行数据重建,得到重建的数字形式的混沌输出信号RDCOA;及
所述第二终端利用所述重建的数字形式的混沌输出信号RDCOA,生成用于对接收自所述第一终端的加密数据进行解密的随机密钥KB。
进一步地,为实现上述目的,本发明还提出一种终端设备,包所述终端设备包括:存储器、数模转换模块、超晶格混沌器件、模数转换模块、数字后处理模块、对称加密模块、通信模块、安全素描模块,所述终端设备进行保密通 信时执行如下步骤:
从公开信道中下载公开噪声源PNS,得到本地噪声源LNSA,保存到所述存储器中;
通过所述数模转换模块将所述本地噪声源LNSA转换为模拟形式的噪声信号,驱动所述超晶格混沌器件,得到模拟形式的超晶格混沌输出信号COA;
根据所述超晶格混沌输出信号COA,利用所述模数转换模块进行模数转换,得到数字形式的混沌输出信号DCOA;
利用所述数字后处理模块对所述数字混沌输出信号DCOA进行数字后处理,生成随机密钥KA;
利用所述对称加密模块和所述随机密钥KA,对明文P进行加密得到密文C,然后通过所述通信模块将所述密文C传输至另一终端;
利用所述安全素描模块对所述数字形式的混沌输出信号DCOA进行安全素描处理,产生辅助数据HA;
通过所述通信模块将所述辅助数据HA发布至所述公开信道,得到公开辅助数据PH以供所述另一终端下载,其中HA=PH。
进一步地,为实现上述目的,本发明还提出一种终端设备,包所述终端设备包括:存储器、数模转换模块、超晶格混沌器件、模数转换模块、数字后处理模块、对称加密模块、通信模块、数据重建模块,所述终端设备进行保密通信时执行如下步骤:
从公开信道中下载公开噪声源PNS,得到本地噪声源LNSB,保存到所述存储器中;
通过所述数模转换模块将所述本地噪声源LNSB转换为模拟形式的噪声信号,驱动所述超晶格混沌器件,得到模拟形式的超晶格混沌输出信号COB;
根据所述超晶格混沌输出信号COB,利用所述模数转换模块进行模数转换,得到数字形式的混沌输出信号DCOB;
从所述公开信道中下载另一终端发送的公开辅助数据PH,保存得到本地的辅助数据HB,且PH=HB,根据所述DCOB和HB,利用所述数据重建模块对所述另一终端中的数字形式的混沌输出信号DCOA进行数据重建,得到重建的数字形式的混沌输出信号RDCOA;
利用所述数字后处理模块对所述重建的数字形式的混沌输出信号RDCOA进行数字后处理,产生随机密钥KB;及
利用对称加密模块和所述随机密钥KB,对所述通信模块从所述另一终端接收到的密文C进行解密得到明文P。
本发明提出的密钥分发方法及终端设备中,可以结合非对称加密技术和对称加密技术的优点,通信的发送方和接收方实现了密钥的分发,分别获得了相同的随机密钥KA和KB,因此,若发送方利用KA加密数据,则接收方可利用KB解密数据。本方法仅仅需要在公开信道上传送公开噪声源PNS和公开辅助数据PH。根据超晶格混沌器件的工作原理,攻击者无法从PNS推测出发送方和接收方利用PNS驱动超晶格混沌器件产生的超晶格混沌输出信号COA和COB。同时,根据安全素描模块的工作原理,攻击者也无法从公开辅助数据PH推测出数字形式的混沌输出信号DCOA。因此,在公开信道上传输公开噪声源PNS和公开辅助数据PH不会影响随机密钥KA和KB的安全性。
附图说明
图1为本发明各个实施例一可选的应用环境示意图;
图2为本发明第一实施例提出的一种终端设备的架构图;
图3和图4为本发明第二实施例提出的一种密钥分发方法的流程图;
图5为所述密钥分发方法中从本地噪声源到随机密钥的处理过程示意图;
图6为所述密钥分发方法中对称加密信息传输的具体流程图;
图7为所述密钥分发方法的另一种表现形式的流程图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
参阅图1所示,是本发明各个实施例一可选的应用环境示意图。
在本实施例中,本发明可应用于包括,但不仅限于,公开信道11、第一终端12、第二终端13组成的对称加密系统1中。所述对称加密系统1用于通过对称加密技术进行信息传输。
其中,所述公开信道11可以是光纤、宽带固网、移动网络、光盘、移动硬盘等,用于进行公开噪声源、辅助数据的发布和信息传输。
所述第一终端12和第二终端13可以是固定的或者可移动的具有信息传输和加解密功能的终端设备,通过所述公开信道11进行通信连接。所述第一终端12和第二终端13分别作为信息传输的两方,发送方用于加密和发送信息,接收方用于接收和解密信息。在本实施例中,以所述第一终端12为发送方,所述第二终端13为接收方为例进行说明。在其他实施例中,也可以将所述第二终端13作为发送方,将所述第一终端12作为接收方,由所述第二终端13利用同样的方法发送信息给所述第一终端12。
至此,已经详细介绍了本发明各个实施例的应用环境。下面,将基于上述应用环境,提出本发明的各个实施例。
实施例一
参阅图2所示,本发明第一实施例提出一种终端设备2。可以理解,所述终端设备2可以是上述第一终端12或第二终端13。所述终端设备2包括存储器20、数模转换模块21、超晶格混沌器件22、模数转换模块23、数字后处理模块24、对称加密模块25、通信模块26、安全素描模块27和数据重建模块28。
其中,所述存储器20至少包括一种类型的可读写存储介质,用于存储本地 噪声源,以及本终端正常运行所需的其他数据和程序。此外,所述存储器20还可以用于暂时地存储已经输出或者将要输出的各类数据。
所述数模转换模块21用于将数字形式存储的本地噪声源转换为模拟形式的噪声信号,以驱动超晶格混沌器件22。所述超晶格混沌器件22用于在模拟形式的本地噪声信号驱动下,产生模拟形式的混沌输出信号,所述混沌输出信号是一个真随机模拟信号。所述模数转换模块23用于将模拟形式的混沌输出信号转换为数字形式的混沌输出信号。所述数字后处理模块24用于处理所述数字形式的混沌输出信号(或者重建的数字形式的混沌输出信号),以生成随机密钥。所述对称加密模块25用于利用所述随机密钥对需要传输的数据进行对称加密或解密,可以对明文进行加密,得到密文,也可以对密文进行解密,得到明文。如果用于加密和解密的随机密钥是相同的,则解密得到的明文与原始明文是相同的。所述通信模块26用于在发送方和接收方之间进行对称加密信息(密文)传输。
所述安全素描模块27应用在作为发送方的所述第一终端12,用于将所述数字形式的混沌输出信号经过安全素描处理,产生辅助数据。所述通信模块26还用于将所述辅助数据发布到所述公开信道11。所述数据重建模块28应用在作为接收方的所述第二终端13,用于以所述数字形式的混沌输出信号和辅助数据作为输入,产生重建的数字形式的混沌输出信号。
所述终端设备2进行保密通信所需执行的步骤如下:
(1)所述第一终端12和第二终端13分别从公开信道中下载公开噪声源,保存得到本地噪声源。
为了保证后续所述第一终端12和第二终端13生成的密钥是相同的,从而不需要在发送方和接收方之间传递密钥,需要保证所述第一终端12和第二终端13使用的本地噪声源LNSA(Local Noise Source A)和LNSB(Local Noise Source B)的数值是相等的,这是通过所述第一终端12和第二终端13分别接收从公开信道上发送的公开噪声源PNS(Public Noise Source)来保证的,即LNSB=PNS=LNSA。
在本实施例中,可以由所述第一终端12、第二终端13或者第三方生成公开 噪声源PNS,然后由PNS的生成者将其发布到所述公开信道11。所述第一终端12、第二终端13的通信模块26分别将所述公开噪声源PNS下载至本地,保存至所述存储器20中,成为本地噪声源LNSA和LNSB。
(2)所述第一终端12和第二终端13分别利用所述本地噪声源,经数模转换模块21转化为模拟信号,驱动超晶格混沌器件22,得到超晶格混沌输出信号。
所述第一终端12和第二终端13分别将本地噪声源LNSA和LNSB所包含的随机二进制数字序列读出,经过数模转换模块21,转为模拟信号形式的噪声信号,用这个噪声信号驱动本地的超晶格混沌器件22,得到超晶格混沌输出信号COA(Chaotic Output A)和COB(Chaotic Output B),所述超晶格混沌输出信号为一个真随机模拟信号。
所述第一终端12和第二终端13中的超晶格混沌器件22必须是经过匹配的超晶格混沌器件22。所谓匹配的超晶格混沌器件22是指这些超晶格混沌器件22结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置,具有极其相似的物理性质和工作特性。所述第一终端12和第二终端13中包含的超晶格混沌器件22分别可作为双方在保密通信中的身份识别标识,因此自动解决了保密通信双方的身份识别和认证问题。配对的超晶格混沌器件22的数量由密码设备的制作方控制,可以是2个或多个,如果有多个配对的超晶格混沌器件22发送到多个通信方,则可以完成多方的加密通信,本实施例所描述之密钥分发方法适用于多方中的每一方。这些配对的超晶格混沌器件22是无法复制的,这是由超晶格混沌器件22的制作和工作原理决定的。因此,除了上述受到密码设备制作方控制的有限个配对的超晶格混沌器件22之外,攻击者无法得到匹配的超晶格混沌器件22。
(3)所述第一终端12和第二终端13分别根据所述超晶格混沌输出信号COA和COB,经过模数转换模块23转换为数字形式的混沌输出信号DCOA(Digital Chaotic Output A)和DCOB(Digital Chaotic Output B)。
(4)所述第一终端12中的所述数字混沌输出信号DCOA经过数字后处理模块24处理,生成随机密钥KA(KeyA)。从而可以利用所述随机密钥KA通过对称加密模块25将明文P加密,得到密文C。然后由通信模块26将密文C通过所述公开信道11发送至所述第二终端13。
(5)所述第一终端12中的所述数字形式的混沌输出信号DCOA经过安全素描模块27处理,产生辅助数据HA(Help Data A)。所述辅助数据HA不会泄露关于DCOA的信息,因此可以通过所述公开信道11传输。
在相同的噪声源驱动下,超晶格混沌输出信号COA和COB是非常相似的。但是由于模数转换的量化噪声,采样时钟的jitter,以及环境噪声和其他噪声的干扰,DCOA和DCOB并不会完全相同。为了实现密钥的分发,必须解决DCOA和DCOB之间并不完全相同这一问题。所述安全素描模块27和后述的数据重建模块28,就是为了解决这一问题。
为了将所述第一终端12产生的密钥KA分发到所述第二终端13,所述第一终端12的通信模块26将产生的辅助数据HA也发布到所述公开信道11,称为公开辅助数据PH。所述第二终端13从所述公开信道11上将公开辅助数据PHA接收到本地存储器20中存储,称为辅助数据HB,这里HB=PH=HA。
(6)所述第二终端13中的数据重建模块28具有纠错功能,以所述数字形式的混沌输出信号DCOB和辅助数据HB两者作为输入,产生重建的数字形式的混沌输出信号RDCOA(Reconstructed Digital Chaotic Output A)。
安全素描模块27根据DCOA产生辅助数据HA,且其在设计上能保证数据重建模块28能够以该辅助数据,以及与DCOA相似的信号DCOB这两者作为输入,正确重建数据,重建出DCOA。根据以上安全素描模块27和数据重建模块28的设计原理,可以保证RDCOA=DCOA。
(7)所述第二终端13中的所述重建的数字形式的混沌输出信号RDCOA经过数字后处理模块24处理,产生随机密钥KB(Key B)。
所述第一终端12和第二终端13中的数字后处理模块24是完全相同的两个数字信号处理模块。因为RDCOA=DCOA,且所述第一终端12和第二终端13中的数字后处理模块24完全相同,因此得到的随机密钥KA=KB。
(8)所述第二终端13中的对称加密模块25利用所述随机密钥KB解密密文C,可以得到原始的明文P。
上述步骤的详细说明请参阅下述第二实施例,在此不再赘述。
本领域技术人员可以理解,图2中示出的结构并不构成对所述终端设备2的限定,所述终端设备2还可以包括其他必要部件,或者组合某些部件,或者不同的部件布置。
实施例二
参阅图3和图4所示,本发明第二实施例提出一种密钥分发方法,应用于所述对称加密系统1中。其中,图3为所述密钥分发方法的密钥生成过程,图4为所述密钥分发方法的密钥重建过程。密钥生成过程和密钥重建过程共同实现了密钥分发功能。在本实施例中,根据不同的需求,图3和图4所示的流程图中的步骤的执行顺序可以改变,某些步骤可以省略。
如图3所示,该方法的密钥生成过程包括以下步骤:
S100,所述第一终端12从公开信道11中下载公开噪声源,保存得到本地噪声源LNSA。
具体地,为了保证后续所述第一终端12和第二终端13生成的密钥是相同的,从而不需要在发送方和接收方之间传递密钥,需要保证所述第一终端12和第二终端13使用的本地噪声源的数值是相等的,这是通过所述第一终端12和第二终端13分别接收从公开信道11上发送的公开噪声源PNS来保证的。
在本实施例中,可以由所述第一终端12、第二终端13或者第三方生成公开噪声源PNS,然后由PNS的生成者将其发布到所述公开信道11。
S102,所述第一终端12利用所述本地噪声源驱动超晶格混沌器件22,得到超晶格混沌输出信号COA。
具体地,加密通信的管理方将分别包含有匹配的第一超晶格混沌器件和第二超晶格混沌器件的第一终端和第二终端分别发送给通信的发送方和接收方,第一超晶格混沌器件和第二超晶格混沌器件可分别作为发送方和接收方的用于保密通信的身份识别和认证标识。所述第一终端12将本地噪声源LNSA所包含的随机二进制数字序列读出,经过数模转换,转为模拟信号形式的噪声信号, 用这个噪声信号驱动本地的超晶格混沌器件22,得到超晶格混沌输出信号COA,所述超晶格混沌输出信号为一个真随机模拟信号。
S104,所述第一终端12根据所述超晶格混沌输出信号COA,经过模数转换得到数字形式的混沌输出信号DCOA。
S106,所述第一终端12中的所述数字混沌输出信号DCOA经过数字后处理,生成随机密钥KA,从而可以利用所述随机密钥KA进行对称加密信息传输。
参阅图5所示,为从所述本地噪声源到所述随机密钥的处理过程示意图。本地噪声源所包含的随机二进制数字序列,经过数模转换,转为模拟信号形式的噪声信号。用该噪声信号驱动本地的超晶格混沌器件22,得到超晶格混沌输出信号,所述超晶格混沌输出信号为一个真随机模拟信号。该真随机模拟信号经过采样和模数转换,可以得到一个真随机数字信号序列。该真随机数字信号序列,经过数字后处理即可作为真随机密钥来使用。
S108,所述第一终端12中的所述数字形式的混沌输出信号DCOA经过安全素描处理,产生辅助数据,并发布至所述公开信道11。
具体地,在相同的噪声源驱动下,第一终端12和第二终端13中产生的超晶格混沌输出信号是非常相似的。但是由于模数转换的量化噪声,采样时钟的jitter,以及环境噪声和其他噪声的干扰,第一终端12和第二终端13中产生的所述数字形式的混沌输出信号并不会完全相同。所述辅助数据可以解决这一问题。为了将所述第一终端12产生的密钥KA分发到所述第二终端13,所述第一终端12的通信模块26将产生的辅助数据HA也发布到所述公开信道11,称为公开辅助数据PH。攻击者即使从所述公开信道11获取到公开辅助数据PH,也无法反推出所述数字形式的混沌输出信号DCOA。
进一步地,如图4所示,该方法的密钥重建过程包括以下步骤:
S200,所述第二终端13从公开信道11中下载公开噪声源,保存得到本地噪声源LNSB。
具体地,所述第一终端12、第二终端13分别将所述公开噪声源PNS下载至本地,保存成为本地噪声源LNSA和LNSB。所述公开噪声源PNS是用于给后续 的超晶格噪声源提供激励的,但公开噪声源的输出和超晶格混沌输出信号的输出没有确定的相关关系。因此,对公开噪声源的要求仅仅是其具备一定的白噪声特性即可,不要求有非常好的随机性。而且,由于公开噪声源的输出和超晶格混沌输出信号的输出没有相关关系,因此可以将公开噪声源通过所述公开信道11传播,而不用担心被截获后破解出超晶格混沌输出信号的特性。所述本地噪声源LNSA和LNSB分别都是PNS的数字副本,数值上是完全相同的,其差别仅仅是在物理位置,LNSA位于所述第一终端12处,而LNSB位于所述第二终端13处。而所述第一终端12和第二终端13可以是不在同一处的,可以分布于任意距离的两地,只要所述第一终端12和第二终端13能够分别接收到所述公开噪声源PNS的信号即可。
所述公开噪声源和所述本地噪声源为一个随机二进制数字序列,并且所述随机二进制数字序列只需具备一定的随机性即可,不一定需要物理真随机。例如,可以由伪随机数生成算法产生一个伪随机数序列。通过改变这个随机二进制数字序列就可以改变后续生成的随机密钥。并且,按照后续所述随机密钥的生成过程,公开噪声源即使被攻击者获取,也无法推测出所述第一终端12和第二终端13的随机密钥。
S202,所述第二终端13利用所述本地噪声源驱动超晶格混沌器件22,得到超晶格混沌输出信号COB。
具体地,所述第二终端13将本地噪声源LNSB所包含的随机二进制数字序列读出,经过数模转换,转为模拟信号形式的噪声信号,用这个噪声信号驱动本地的超晶格混沌器件22,得到超晶格混沌输出信号COB,所述超晶格混沌输出信号为一个真随机模拟信号。
所述第一终端12和第二终端13中的超晶格混沌器件22必须是经过匹配的超晶格混沌器件22,在本地噪声信号的驱动下,将发生同步混沌振荡,这种振荡是一种物理真随机效应,其所产生的振荡信号是真随机信号。而且,由于LNSA和LNSB是相同的,在这种情况下所产生的真随机信号也是极其相似的(两个信号时间上可以有偏移)。
所谓匹配的超晶格混沌器件22是指这些超晶格混沌器件22结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置,具有极其相似的物 理性质和工作特性。所述第一终端12和第二终端13中包含的超晶格混沌器件22分别可作为双方在保密通信中的身份识别标识,因此自动解决了保密通信双方的身份识别和认证问题。配对的超晶格混沌器件22的数量由密码设备的制作方控制,可以是2个或多个,如果有多个配对的超晶格混沌器件22发送到多个通信方,则可以完成多方的加密通信,本实施例所描述之密钥分发方法适用于多方中的每一方。这些配对的超晶格混沌器件22是无法复制的,这是由超晶格混沌器件22的制作和工作原理决定的。因此,除了上述受到密码设备制作方控制的有限个配对的超晶格混沌器件22之外,攻击者无法得到匹配的超晶格混沌器件22。
由于所述第一终端12和第二终端13匹配的本地超晶格混沌器件22具有物理不可克隆特性,因此只可能在与所述第一终端12和第二终端13的本地超晶格混沌器件22同批次制作时所获得。除此以外,不可能得到与的所述第一终端12和第二终端13匹配的超晶格混沌器件,因此攻击者即使截获了公开噪声源,也无法生成与所述第一终端12和第二终端13相同的密钥。从而,公开噪声源可以在公开信道上传输,而不必担心被截获后复制出与所述第一终端12和第二终端13相同的密钥。
S204,所述第二终端13根据所述超晶格混沌输出信号COB,经过模数转换得到数字形式的混沌输出信号DCOB。
S206,所述第二终端13从所述公开信道11中下载辅助数据,经过数据重建后得到重建的数字形式的混沌输出信号RDCOA。
具体地,所述第二终端13从所述公开信道11上将公开辅助数据PH接收到本地存储,称为辅助数据HB,这里HB=PH=HA。然后,以所述数字形式的混沌输出信号DCOB和辅助数据HB两者作为输入,产生重建的数字形式的混沌输出信号RDCOA。DCOB与DCOA相似,但并不完全相同,只要DCOB和DCOA的汉明距离不超过预先设定的容许最大汉明距离HDMAX,则可以得到重建的RDCOA,RDCOA是对DCOA的重建,即RDCOA=DCOA。HDMAX可以根据DCOB和DCOA的实际汉明距离调整,以保证完全准确的数据重建。
S208,所述第二终端13中的所述重建的数字形式的混沌输出信号RDCOA经过数字后处理,产生随机密钥KB,以对所述第一终端12传输的对称加密信 息进行解密。
具体地,所述第一终端12和第二终端13中的数字后处理模块24是完全相同的两个数字信号处理模块。因为RDCOA=DCOA,且所述第一终端12和第二终端13中的数字后处理模块24完全相同,因此得到的随机密钥KB=KA。因此,利用对称加密算法进行加密信息传输时,所述随机密钥KA和KB可分别用于数据的加密密钥和解密密钥。
参阅图6所示,为所述对称加密信息传输的具体流程图。所述对称加密信息传输具体包括步骤:
S600,第一终端12利用所述随机密钥KA加密明文P,得到密文C。
具体地,所述第一终端12利用所生成的随机密钥KA,对待加密的信息明文P进行加密,得到密文C。
S602,第一终端12将所述密文C发送至第二终端13。
具体地,所述第一终端12将加密得到的所述密文C,通过所述公开信道11发送给所述第二终端13。
S604,第二终端13接收第一终端12发送的所述密文C。
具体地,所述第二终端13从所述公开信道11中接收所述密文C。
S606,第二终端13利用所述随机密钥KB解密所述密文C,得到所述明文P。
具体地,所述第二终端13利用所生成的随机密钥KB,对所述密文C进行解密。由于所述第一终端12和第二终端13生成的密钥是保证相同的(KA=KB),因此所述第一终端12可以利用成熟的对称加密算法对明文P进行加密。通信的双方不需要传递密钥,凭借本地生成的密钥KA和KB就可以用于信息的加密和解密。本方法结合了非对称加密技术的优点(不需传输密钥)以及对称加密技术的优点(性能高),适合大数据量的信息传输。
参阅图7所示,为所述密钥分发方法的另一种表现形式的流程图。该流程图中的具体步骤与上述步骤类似,在此不再赘述。
本实施例所提出的密钥分发方法,可以结合非对称加密技术和对称加密技术的优点,通信的发送方和接收方实现了密钥的分发,分别获得了相同的随机密钥KA和KB,因此,若发送方利用KA加密数据,则接收方可利用KB解密数据。本方法仅仅需要在公开信道11上传送公开噪声源PNS和公开辅助数据PH。根据超晶格混沌器件22的工作原理,攻击者无法从PNS推测出发送方和接收方利用PNS驱动超晶格混沌器件22产生的超晶格混沌输出信号COA和COB。同时,根据安全素描模块27的工作原理,攻击者也无法从公开辅助数据PH推测出数字形式的混沌输出信号DCOA。因此,在公开信道11上传输公开噪声源PNS和公开辅助数据PH不会影响随机密钥KA和KB的安全性。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个......”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助硬件加必须的辅助软件的方式来实现。基于这样的理解,本发明的技术方案可以以硬件和软件产品的形式体现出来,用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,这些均属于本发明的保护之内。

Claims (19)

  1. 一种密钥分发方法,其中,该方法包括步骤:
    第一终端从公开信道中下载公开噪声源PNS,保存得到本地噪声源LNSA;
    所述第一终端利用所述本地噪声源LNSA驱动超晶格混沌器件,得到超晶格混沌输出信号COA;
    所述第一终端对所述超晶格混沌输出信号COA进行模数转换,得到数字形式的混沌输出信号DCOA;所述第一终端对所述数字形式的混沌输出信号DCOA进行安全素描处理,产生辅助数据HA;
    所述第一终端将所述辅助数据HA发布至所述公开信道,得到公开辅助数据PH以供第二终端下载,其中HA=PH。
  2. 根据权利要求1所述的密钥分发方法,其中,利用所述本地噪声源LNSA驱动超晶格混沌器件,得到超晶格混沌输出信号COA的步骤包括:
    所述第一终端读取本地噪声源LNSA所包含的随机二进制数字序列;
    对所述随机二进制数字序列经过数模转换,得到模拟信号形式的噪声信号;
    利用所述噪声信号驱动本地的所述超晶格混沌器件,得到超晶格混沌输出信号COA,所述超晶格混沌输出信号为一个真随机模拟信号。
  3. 根据权利要求1所述的密钥分发方法,其中,该方法还包括步骤:
    所述第一终端利用所述数字混沌输出信号DCOA生成随机密钥KA,从而利用所述随机密钥KA进行加密得到加密数据,发送至所述第二终端。
  4. 根据权利要求1所述的密钥分发方法,其中,所述第一终端和所述第二终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  5. 根据权利要求2所述的密钥分发方法,其中,所述第一终端和所述第二终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  6. 根据权利要求3所述的密钥分发方法,其中,所述第一终端和所述第二终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  7. 一种密钥分发方法,其中,该方法包括步骤:
    第二终端从公开信道中下载公开噪声源PNS,保存得到本地噪声源LNSB;
    所述第二终端利用所述本地噪声源LNSB驱动超晶格混沌器件,得到超晶格混沌输出信号COB;
    所述第二终端对所述超晶格混沌输出信号COB进行模数转换,得到数字形式的混沌输出信号DCOB;
    所述第二终端从所述公开信道中下载第一终端发送的公开辅助数据PH,保存得到本地的辅助数据HB,且HB=PH;
    所述第二终端利用所述DCOB和辅助数据HB对所述第一终端中的数字形式的混沌输出信号DCOA进行数据重建,得到重建的数字形式的混沌输出信号RDCOA;及
    所述第二终端利用所述重建的数字形式的混沌输出信号RDCOA,生成用于对接收自所述第一终端的加密数据进行解密的随机密钥KB。
  8. 根据权利要求7所述的密钥分发方法,其中,利用所述本地噪声源LNSB驱动超晶格混沌器件,得到超晶格混沌输出信号COB的步骤包括:
    所述第二终端读取本地噪声源LNSB所包含的随机二进制数字序列;
    对所述随机二进制数字序列经过数模转换,得到模拟信号形式的噪声信号;
    利用所述噪声信号驱动本地的所述超晶格混沌器件,得到超晶格混沌输出信号COB,所述超晶格混沌输出信号为一个真随机模拟信号。
  9. 根据权利要求8所述的密钥分发方法,其中,根据所述数字形式的混沌输出信号DCOB和DCOA的实际汉明距离,设计所容许的最大汉明距离HDMAX,以保证数据重建的成功。
  10. 根据权利要求7所述的密钥分发方法,其中,所述第一终端和所述第二终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  11. 根据权利要求8所述的密钥分发方法,其中,所述第一终端和所述第二终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  12. 根据权利要求9所述的密钥分发方法,其中,所述第一终端和所述第二终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  13. 一种终端设备,其中,所述终端设备包括:存储器、数模转换模块、超晶格混沌器件、模数转换模块、数字后处理模块、对称加密模块、通信模块、安全素描模块,所述终端设备进行保密通信时执行如下步骤:
    从公开信道中下载公开噪声源PNS,得到本地噪声源LNSA,保存到所述存储器中;
    通过所述数模转换模块将所述本地噪声源LNSA转换为模拟形式的噪声信号,驱动所述超晶格混沌器件,得到模拟形式的超晶格混沌输出信号COA;
    根据所述超晶格混沌输出信号COA,利用所述模数转换模块进行模数转换,得到数字形式的混沌输出信号DCOA;
    利用所述数字后处理模块对所述数字混沌输出信号DCOA进行数字后处理,生成随机密钥KA;
    利用所述对称加密模块和所述随机密钥KA,对明文P进行加密得到密文C,然后通过所述通信模块将所述密文C传输至另一终端;
    利用所述安全素描模块对所述数字形式的混沌输出信号DCOA进行安全素描处理,产生辅助数据HA;
    通过所述通信模块将所述辅助数据HA发布至所述公开信道,得到公开辅助数据PH以供所述另一终端下载,其中HA=PH。
  14. 根据权利要求13所述的终端设备,其中,所述终端设备和所述另一终端中的超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  15. 根据权利要求14所述的终端设备,其中,由于所述超晶格混沌器件的物理不可克隆特性,所述终端设备中的超晶格混沌器件作为发送方的用于保密通信的身份识别和认证标识。
  16. 一种终端设备,其中,所述终端设备包括:存储器、数模转换模块、超晶格混沌器件、模数转换模块、数字后处理模块、对称加密模块、通信模块、数据重建模块,所述终端设备进行保密通信时执行如下步骤:
    从公开信道中下载公开噪声源PNS,得到本地噪声源LNSB,保存到所述存储器中;
    通过所述数模转换模块将所述本地噪声源LNSB转换为模拟形式的噪声信号,驱动所述超晶格混沌器件,得到模拟形式的超晶格混沌输出信号COB;
    根据所述超晶格混沌输出信号COB,利用所述模数转换模块进行模数转换,得到数字形式的混沌输出信号DCOB;
    从所述公开信道中下载另一终端发送的公开辅助数据PH,保存得到本地的辅助数据HB,且PH=HB,根据所述DCOB和HB,利用所述数据重建模块对所述另一终端中的数字形式的混沌输出信号DCOA进行数据重建,得到重建的数字形式的混沌输出信号RDCOA;
    利用所述数字后处理模块对所述重建的数字形式的混沌输出信号RDCOA进行数字后处理,产生随机密钥KB;及
    利用对称加密模块和所述随机密钥KB,对所述通信模块从所述另一终端接收到的密文C进行解密得到明文P。
  17. 根据权利要求16所述的终端设备,其中,所述终端设备和所述另一终端中的所述超晶格混沌器件相互匹配,即结构相同,制作工艺相同,且制作时位于同一片半导体晶圆的邻近的位置。
  18. 根据权利要求17所述的终端设备,其中,所述重建的数字形式的混沌输出信号RDCOA与所述数字形式的混沌输出信号DCOA相同,且所述终端设备和所述另一终端中的所述数字后处理模块完全相同,得到的随机密钥相同。
  19. 根据权利要求18所述的终端设备,其中,由于所述超晶格混沌器件的物理不可克隆特性,所述终端设备中的超晶格混沌器件作为接收方的用于保密通信的身份识别和认证标识。
PCT/CN2019/087465 2018-05-22 2019-05-17 密钥分发方法及终端设备 WO2019223624A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810497498.5A CN110519210A (zh) 2018-05-22 2018-05-22 密钥分发方法及终端设备
CN201810497498.5 2018-05-22

Publications (1)

Publication Number Publication Date
WO2019223624A1 true WO2019223624A1 (zh) 2019-11-28

Family

ID=68615931

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/087465 WO2019223624A1 (zh) 2018-05-22 2019-05-17 密钥分发方法及终端设备

Country Status (2)

Country Link
CN (1) CN110519210A (zh)
WO (1) WO2019223624A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311763A (zh) * 2022-06-24 2022-11-08 北京电子科技学院 一种身份识别方法及系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049652A (zh) * 2019-12-23 2020-04-21 北京明朝万达科技股份有限公司 数据传输方法、装置、电子设备及计算机可读存储介质
CN111212072B (zh) * 2019-12-31 2021-05-14 北京明朝万达科技股份有限公司 基于超晶格加解密芯片的车辆安全控制方法和系统
CN111324899A (zh) * 2020-01-21 2020-06-23 中国科学院苏州纳米技术与纳米仿生研究所 存储/读取数据的方法、装置及系统
CN111246251A (zh) * 2020-01-21 2020-06-05 中国科学院苏州纳米技术与纳米仿生研究所 视频流数据的加密传输方法、终端、系统及应用

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030091190A1 (en) * 2001-11-12 2003-05-15 Toshiba Information Systems (Japan) Corporation Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device
CN102609238A (zh) * 2012-02-13 2012-07-25 中国科学院苏州纳米技术与纳米仿生研究所 随机数生成系统以及随机数生成方法
CN103354494A (zh) * 2013-07-05 2013-10-16 中国科学院苏州纳米技术与纳米仿生研究所 一种基于超晶格混沌同步的通讯系统
CN103929301A (zh) * 2014-05-07 2014-07-16 中国科学院微电子研究所 真随机数生成方法、装置及电力设备

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7076065B2 (en) * 2001-05-11 2006-07-11 Lockheed Martin Corporation Chaotic privacy system and method
DE102004047425B4 (de) * 2004-09-28 2007-06-21 Micronas Gmbh Zufallszahlengenerator sowie Verfahren zur Erzeugung von Zufallszahlen
US8224018B2 (en) * 2006-01-23 2012-07-17 Digimarc Corporation Sensing data from physical objects
CN1889428B (zh) * 2006-08-01 2010-06-09 西南交通大学 网络环境下生物特征数据的安全隐匿传输方法
EP2047361B1 (en) * 2006-08-03 2016-06-08 Tubitak Random numbers generation using continous-time chaos
CN101394266B (zh) * 2008-10-24 2010-12-08 华中科技大学 一种生成变参数混沌信号的方法及混沌保密通信系统
CN103188075B (zh) * 2013-02-01 2016-01-06 广州大学 一种密钥和真随机数发生器及生成密钥和真随机数的方法
CN103560876B (zh) * 2013-11-22 2016-06-22 北京航空航天大学 一种使用基于混沌的随机时钟的加密方法及装置
CN105071930A (zh) * 2015-07-24 2015-11-18 苏州矗联电子技术有限公司 一种低成本安全密钥分发装置
CN105007159A (zh) * 2015-07-24 2015-10-28 苏州矗联电子技术有限公司 基于混沌同步的秘钥分发装置
CN105007285B (zh) * 2015-08-19 2018-07-24 南京万道电子技术有限公司 一种基于物理不可克隆函数的密钥保护方法和安全芯片
CN105262585B (zh) * 2015-09-22 2018-03-30 太原理工大学 一种安全高速的密钥分发系统及方法
WO2017177105A1 (en) * 2016-04-07 2017-10-12 The Johns Hopkins University System and method for physical one-way function authentication via chaotic integrated photonic resonators
CN105763313A (zh) * 2016-04-13 2016-07-13 电子科技大学 一种基于混沌信号动态同步的密钥分配方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030091190A1 (en) * 2001-11-12 2003-05-15 Toshiba Information Systems (Japan) Corporation Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device
CN102609238A (zh) * 2012-02-13 2012-07-25 中国科学院苏州纳米技术与纳米仿生研究所 随机数生成系统以及随机数生成方法
CN103354494A (zh) * 2013-07-05 2013-10-16 中国科学院苏州纳米技术与纳米仿生研究所 一种基于超晶格混沌同步的通讯系统
CN103929301A (zh) * 2014-05-07 2014-07-16 中国科学院微电子研究所 真随机数生成方法、装置及电力设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311763A (zh) * 2022-06-24 2022-11-08 北京电子科技学院 一种身份识别方法及系统

Also Published As

Publication number Publication date
CN110519210A (zh) 2019-11-29

Similar Documents

Publication Publication Date Title
WO2019223583A1 (zh) 数据加密传输方法、终端设备及超晶格混沌器件的使用方法
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
WO2019223624A1 (zh) 密钥分发方法及终端设备
CN108377189B (zh) 区块链上用户通信加密方法、装置、终端设备及存储介质
US20220158832A1 (en) Systems and Methods for Deployment, Management and Use of Dynamic Cipher Key Systems
US10880100B2 (en) Apparatus and method for certificate enrollment
WO2016136024A1 (ja) 鍵付替え方向制御システムおよび鍵付替え方向制御方法
US7894608B2 (en) Secure approach to send data from one system to another
CA3056814A1 (en) Symmetric cryptographic method and system and applications thereof
US10630466B1 (en) Apparatus and method for exchanging cryptographic information with reduced overhead and latency
WO2022033122A1 (zh) 一种密钥管理系统
CN115828310B (zh) 一种基于隐私计算的数据查询方法、装置及存储介质
CN112187460A (zh) 一种面向主从网络的根密钥隐藏对称加密算法
CN111246251A (zh) 视频流数据的加密传输方法、终端、系统及应用
CN114553420B (zh) 基于量子密钥的数字信封封装方法及数据保密通信网络
US20230269066A1 (en) Method and apparatus for provisioning node-locking confidential data
Zakir et al. A Survey on Various Encryption/Decryption Techniques Used in Mobile and Cloud Computing
Rajput et al. Algorithmic Approach to Encrypted Modes of Transmission of Real Time Media in a VOIP Architecture
CN116405313A (zh) 一种匿名的条件基于身份广播代理重加密方法及系统
CN117411627A (zh) 一种基于区块链的数据安全传输方法
KR20180003293A (ko) 비대칭 패스워드 기반 인증된 키 합의 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19807641

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19807641

Country of ref document: EP

Kind code of ref document: A1