Movatterモバイル変換


[0]ホーム

URL:


CN106452750B - A quantum encrypted communication method for mobile devices - Google Patents

A quantum encrypted communication method for mobile devices
Download PDF

Info

Publication number
CN106452750B
CN106452750BCN201610907462.0ACN201610907462ACN106452750BCN 106452750 BCN106452750 BCN 106452750BCN 201610907462 ACN201610907462 ACN 201610907462ACN 106452750 BCN106452750 BCN 106452750B
Authority
CN
China
Prior art keywords
mobile device
quantum
quantum key
key
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610907462.0A
Other languages
Chinese (zh)
Other versions
CN106452750A (en
Inventor
宋立军
朱德新
吴佳楠
李晓辉
魏荣凯
韩家伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University
Original Assignee
Changchun University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun UniversityfiledCriticalChangchun University
Priority to CN201610907462.0ApriorityCriticalpatent/CN106452750B/en
Publication of CN106452750ApublicationCriticalpatent/CN106452750A/en
Application grantedgrantedCritical
Publication of CN106452750BpublicationCriticalpatent/CN106452750B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

A kind of quantum encryption communication method for mobile device of the present invention, belong to mobile device security application field and Quantum Secure Communication field, both sides' mobile device establishes communication connection in this method, after both sides' mobile device and client identity authenticate successfully, if carrying out quantum encryption communication between mobile device, client both sides are then needed to obtain quantum key from quantum gateway, the quantum key of acquisition is converted to two dimensional code by client, mobile device scans local terminal client two dimensional code, two dimensional code is converted into quantum key, carries out quantum key coded communication.A kind of quantum encryption communication method for mobile device proposed by the present invention is combined closely by quantum key and mobile device encryption information, realizes the absolute safety that mobile device encryption information is transmitted in a network.

Description

A kind of quantum encryption communication method for mobile device
Technical field
The invention belongs to mobile device security application fields and Quantum Secure Communication field, more particularly to one kindFor the quantum encryption communication method of mobile device, the method achieve Quantum Secure Communications and mobile device safety to answerWith combining closely for field.
Background technique
As mobile Internet is fast-developing and depth penetrates into our daily life gradually, mobile device has become peopleCarry-on necessary article of living, mobile device information security issue also become focus concerned by people.The communication of mobile device informationMass data is more complicated, and data communication relies on network transmission, and therefore, attacker probably passes through various network attacksMeans, to steal some significant datas.After data information is stolen, in addition to that can affect to the privacy of user,Also the safety of user can be seriously threatened.
Quantum Secure Communication is that a kind of completely new safety of the proposition of combining closely based on quantum mechanics and cryptography is logicalLetter system mainly utilizes the physical characteristics such as quantum state is not reproducible, single quantum is indivisible, provides theoretically for communicating pairThe communication of unconditional security.It enables communicating pair output and shares a security key being randomly generated, to encrypt reconciliationConfidential information.According to the unclonable principle of quantum, it is known that quantum state can not be accurately reproduced over time, i.e., listener-in can not copy oneIdentical " key " decodes the information of encryption accordingly;It is uncertain former according to information interference theory and HeisenbergReason, any eavesdropping detected in communication process, can all damage the protective layer of key, so that transmission both sides be made to learn depositing for listener-inAnd his information content for being intercepted and captured.
Summary of the invention
The technical problems to be solved by the invention: the present invention provides a kind of quantum encryption communication side for mobile deviceMethod is realized mobile device encryption information and is passed in a network by combining closely for quantum key and mobile device encryption informationDefeated absolute safety.
To achieve the goals above, the invention proposes a kind of quantum encryption communication methods for mobile device, specialSign is: includes the following steps, and following steps sequentially carry out,
It is communicated to connect Step 1: mobile device A and mobile device B is established;
Step 2: the mobile device A is to mobile device B quantum coded communication connection request;
Step 3: the mobile device B responds the quantum encryption communication connection request, and sent together to mobile device AMeaning establishes the information of quantum encryption communication connection;
Step 4: the mobile device A is to first quantum gateway the first quantum key of application, while server is from the second amountSubnet closes application and matched second quantum key of the first quantum key;The mobile device B is to third quantum gateway applicationThree quantum keys, while server is from the second quantum gateway application and matched 4th quantum key of third quantum key;
Step 5: the mobile device A is encrypted clear data to be transmitted by the first quantum key, obtain closeLiterary data, and ciphertext data are sent to server;
Step 6: the server receives the ciphertext data that mobile device A is sent, and solved by the second quantum keyIt is close to obtain clear data,
Decryption is obtained clear data by the 4th quantum key and is encrypted to obtain ciphertext data by server, and is sent toMobile device B;
Step 7: the mobile device B receives the ciphertext data that server is sent to it, and by third quantum key intoRow decryption obtains clear data, completes the quantum encryption communication connection between mobile device A and mobile device B.
Further, mobile device A to first quantum gateway application the first quantum key length is in the step 41024 bytes.
Further, mobile device B to third quantum gateway application third quantum key length is in the step 41024 bytes.
Further, mobile device A described in step 5 is carried out by the first quantum key and clear data to be transmittedBit-by-bit XOR operation obtains ciphertext data.
Further, server described in step 6 is close by the slave mobile device A ciphertext data received and the second quantumKey carries out bit-by-bit XOR operation, obtains clear data.
Further, the second quantum key is decrypted to obtain clear data and the 4th amount for server described in step 6Sub-key carries out bit-by-bit XOR operation, obtains ciphertext data.
Further, the mobile device A is by the first quantum key of 1024 bytes, the number for being 128 by every part of byte numberAmount is segmented, and the quantum key of 128 bytes is converted to two dimensional code.
Further, the mobile device B is by the third quantum key of 1024 bytes, the number for being 128 by every part of byte numberAmount is segmented, and the quantum key of 128 bytes is converted to two dimensional code.
Through the above design, the present invention can be brought the following benefits: the invention proposes one kind for movingThe quantum encryption communication method of equipment is realized movement and is set by combining closely for quantum key and mobile device encryption informationThe absolute safety that standby encryption information is transmitted in a network, this method realize quantum encryption communication, and mobile device starts local terminalQuantum key is converted to two dimensional code by client, the quantum key that client read volume subnet closes, client, and mobile device utilizesTwo-dimentional coded program is read, two dimensional code is converted into quantum key, then encrypts using quantum key and decrypts the communication information, i.e., in factThe quantum encryption communication between mobile device is showed.
Detailed description of the invention
The invention will be further described with specific embodiment for explanation with reference to the accompanying drawing:
Fig. 1 is a kind of network implementation schematic diagram of the quantum encryption communication method for mobile device of the present invention.
Fig. 2 is a kind of work flow diagram of the quantum encryption communication method for mobile device of the present invention.
Fig. 3 is client application key flow chart in a kind of quantum encryption communication method for mobile device of the present invention.
Fig. 4 is that quantum key switchs to two-dimensional code principle in a kind of quantum encryption communication method for mobile device of the present inventionFigure.
Fig. 5 is that a kind of mobile device of the quantum encryption communication method for mobile device of the present invention scans the two-dimensional code principleFigure.
Fig. 6 is a kind of mobile device communication flow chart of the quantum encryption communication method for mobile device of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer with reference to specific embodiments and referenceAttached drawing, the present invention is described in further detail.
A kind of quantum encryption communication method for mobile device, includes the following steps, and following steps sequentially carry out,
It is communicated to connect Step 1: mobile device A and mobile device B is established;
Step 2: the mobile device A is to mobile device B quantum coded communication connection request;
Step 3: the mobile device B responds the quantum encryption communication connection request, and sent together to mobile device AMeaning establishes the information of quantum encryption communication connection;
Step 4: the mobile device A is to first quantum gateway the first quantum key of application, while server is from the second amountSubnet closes application and matched second quantum key of the first quantum key;The mobile device B is to third quantum gateway applicationThree quantum keys, while server is from the second quantum gateway application and matched 4th quantum key of third quantum key;
Step 5: the mobile device A is encrypted clear data to be transmitted by the first quantum key, obtain closeLiterary data, and ciphertext data are sent to server;
Step 6: the server receives the ciphertext data that mobile device A is sent, and solved by the second quantum keyIt is close to obtain clear data,
Decryption is obtained clear data by the 4th quantum key and is encrypted to obtain ciphertext data by server, and is sent toMobile device B;
Step 7: the mobile device B receives the ciphertext data that server is sent to it, and by third quantum key intoRow decryption obtains clear data, completes the quantum encryption communication connection between mobile device A and mobile device B.
Shown in referring to Fig.1, a kind of quantum encryption communication method for mobile device includes: quantum key generates network,Server, client, mobile device.Wherein:
Quantum key generates network: dotted line coupling part is that quantum key generates network in Fig. 1, and quantum key generates networkIn each node include quantum gateway, information is interacted by light quantum interchanger between node.Quantum gateway utilizes optical fiberQuantum channel generates the quantum key that is perfectly safe in real time, and then quantum key is stored in quantum gateway.
Server: server includes client identity authentication procedure, mobile equipment identity authentication procedure, server read volumeSub-key program and routing program.Whether the identity information that client identity authentication procedure is used to verify client is correct, ifIdentity information is correct, then client-side program successfully starts up.Mobile equipment identity authentication procedure is used to verify the body of mobile deviceWhether part information is correct, if identity information is correct, mobile device program is successfully started up.Server reads quantum key journeySequence is used to obtain the quantum key to match with each client from quantum gateway.Server routing program is used for a movementThe encryption information of equipment is decrypted, and is then re-encrypted and is transmitted to another mobile device.
Client: quantum key program and conversion quantum key journey are read including hand shake procedure, client between clientSequence.Mobile device starts the client of local terminal, and client utilizes hand shake procedure, it is determined whether quantum key program is read in starting.If not starting, then client does not read quantum key;Otherwise, client is using quantum key program is read, from quantum gatewayQuantum key is read, restarts conversion quantum key program for quantum key and is converted to two dimensional code, so as to mobile device scanning.
Mobile device: mobile device includes the signal procedure and the two-dimentional coded program of reading between mobile device.The communication journeyUnencrypted communication between mobile device had both may be implemented in sequence, and quantum encryption communication also may be implemented.If being non-between mobile deviceCoded communication does not need the client of starting local terminal then.If quantum encryption communication, mobile device needs to start the client of local terminalQuantum key is converted to two dimensional code by end, the quantum key that client read volume subnet closes, client, and mobile device utilizes readingTwo dimensional code is converted to quantum key by two-dimentional coded program, is then encrypted and is decrypted the communication information using quantum key, that is, realizeQuantum encryption communication between mobile device.
A kind of work flow diagram of the quantum encryption communication method for mobile device, as shown in Fig. 2, the application methodDetailed process steps are as follows:
1) starting quantum key generates network, and quantum key is stored in each quantum gateway.
2) after both sides' mobile device and client identity authenticate successfully, if carrying out quantum encryption communication between mobile device,Client both sides are then needed to obtain quantum key from quantum gateway.
3) quantum key of acquisition is converted to two dimensional code by client.
4) mobile device scans client two dimensional code, and two dimensional code is converted to quantum key, and it is logical to carry out quantum key encryptionLetter.
Client application key flow chart in a kind of quantum encryption communication method for mobile device, as shown in figure 3, instituteThe specific protocol steps for stating application method are as follows:
1) the mobile device A described in Fig. 1, mobile device B start signal procedure.
2) mobile device A and mobile device B carries out non-encrypted information communication;If mobile device A and mobile device B is carried outQuantum encryption communication, then mobile device A starts local terminal customer end A, mobile device B starts local terminal customer end B.
3) customer end A is initiated to request from quantum gateway application quantum key to customer end B.
4) customer end B receives the application quantum key request of customer end A sending, whether will apply for that quantum key result is anti-It feeds customer end A.
5) customer end A receives the feedback result of customer end B, if quantum key is not applied for, then quantum encryption communicationDo not start;Otherwise customer end A is to the first quantum key of 1024 byte of the first quantum gateway application, while server is from the second amountSubnet closes application and matched second quantum key of the first quantum key.
6) customer end B is to the third quantum key of 1024 byte of third quantum gateway application, while server is from the second amountSubnet closes application and matched 4th quantum key of third quantum gateway.
Quantum key switchs to two-dimensional code principle figure in a kind of quantum encryption communication method for mobile device, such as Fig. 4 instituteShow, the specific protocol steps of the application method are as follows:
1) quantum key of 1024 bytes is divided into 8 parts, every part of 128 bytes by client.
2) 128 byte quantum keys are converted to two dimensional code by client.
A kind of mobile device of the quantum encryption communication method for mobile device scans the two-dimensional code schematic diagram, such as Fig. 5 instituteShow, a kind of mobile device communication flow chart of the quantum encryption communication method for mobile device, as shown in fig. 6, the useThe specific protocol steps of method are as follows:
1) two dimensional code that mobile device A sweep customer end A generates reads the first quantum key for including in two dimensional code.
2) two dimensional code that mobile device B-scan customer end B generates reads the second quantum key for including in two dimensional code.
3) clear data and the first quantum key carry out bit-by-bit XOR operation in mobile device A, generate ciphertext, thenCiphertext data are transferred to server by mobile device A.
4) server receives the ciphertext data of mobile device A transmission, first with the first quantum key matched theTwo quantum keys and ciphertext data carry out bit-by-bit XOR operation, generate clear data;Then server recycling and thirdMatched 4th quantum key of quantum gateway carries out bit-by-bit XOR operation with the clear data just decrypted, and generates ciphertext numberAccording to;Ciphertext data are transferred to mobile device B by last server.
5) mobile device B receives the ciphertext data of server transmission, then utilizes third quantum key and ciphertext dataBit-by-bit XOR operation is carried out, clear data is generated, in this way the communication of completion primary encryption.

Claims (6)

Translated fromChinese
1.一种用于移动设备的量子加密通信方法,其特征是:包括以下步骤,且如下步骤顺次进行,1. a quantum encryption communication method for mobile equipment, is characterized in that: comprise the following steps, and the following steps are carried out in sequence,步骤一、移动设备A与移动设备B建立通信连接;Step 1, the mobile device A and the mobile device B establish a communication connection;步骤二、所述移动设备A向移动设备B发送量子加密通信连接请求;Step 2, the mobile device A sends a quantum encryption communication connection request to the mobile device B;步骤三、所述移动设备B响应所述量子加密通信连接请求,并向移动设备A发送同意建立量子加密通信连接的信息;Step 3, the mobile device B responds to the quantum encryption communication connection request, and sends the information agreeing to establish a quantum encryption communication connection to the mobile device A;步骤四、所述移动设备A向第一量子网关申请第一量子密钥,同时服务器从第二量子网关申请与第一量子密钥匹配的第二量子密钥;所述移动设备B向第三量子网关申请第三量子密钥,同时服务器从第二量子网关申请与第三量子密钥匹配的第四量子密钥;Step 4: The mobile device A applies to the first quantum gateway for a first quantum key, and the server applies for a second quantum key that matches the first quantum key from the second quantum gateway; the mobile device B applies to the third quantum gateway. The quantum gateway applies for a third quantum key, while the server applies for a fourth quantum key matching the third quantum key from the second quantum gateway;步骤五、所述移动设备A通过第一量子密钥将待传输的明文数据进行加密,得到密文数据,并将密文数据发送给服务器;Step 5. The mobile device A encrypts the plaintext data to be transmitted through the first quantum key to obtain ciphertext data, and sends the ciphertext data to the server;步骤六、所述服务器接收移动设备A发送的密文数据,并通过第二量子密钥进行解密得到明文数据,In step 6, the server receives the ciphertext data sent by the mobile device A, and decrypts it through the second quantum key to obtain the plaintext data,服务器通过第四量子密钥将解密得到明文数据进行加密得到密文数据,并发送给移动设备B;The server encrypts the decrypted plaintext data through the fourth quantum key to obtain ciphertext data, and sends it to the mobile device B;步骤七、所述移动设备B接收服务器向其发送的密文数据,并通过第三量子密钥进行解密得到明文数据,完成移动设备A与移动设备B间的量子加密通信连接。Step 7: The mobile device B receives the ciphertext data sent to it by the server, and obtains plaintext data by decrypting it with the third quantum key, and completes the quantum encrypted communication connection between the mobile device A and the mobile device B.2.根据权利要求1所述的一种用于移动设备的量子加密通信方法,其特征是:所述步骤四中移动设备A向第一量子网关申请第一量子密钥长度为1024字节。2 . The quantum encryption communication method for mobile devices according to claim 1 , wherein in the step 4, the mobile device A applies to the first quantum gateway for a first quantum key with a length of 1024 bytes. 3 .3.根据权利要求1所述的一种用于移动设备的量子加密通信方法,其特征是:所述步骤四中移动设备B向第三量子网关申请第三量子密钥长度为1024字节。3 . A quantum encryption communication method for mobile devices according to claim 1 , wherein in the step 4, the mobile device B applies to the third quantum gateway for a third quantum key with a length of 1024 bytes. 4 .4.根据权利要求1所述的一种用于移动设备的量子加密通信方法,其特征是:步骤五中所述移动设备A通过第一量子密钥与待传输的明文数据进行逐个比特异或运算,得到密文数据。4. a kind of quantum encryption communication method for mobile device according to claim 1 is characterized in that: described in step 5, mobile device A carries out bit-by-bit XOR with the plaintext data to be transmitted by the first quantum key operation to obtain ciphertext data.5.根据权利要求1所述的一种用于移动设备的量子加密通信方法,其特征是:步骤六中所述服务器将从移动设备A接收到的密文数据与第二量子密钥进行逐个比特异或运算,得到明文数据。5. a kind of quantum encryption communication method for mobile device according to claim 1 is characterized in that: in step 6, the server carries out one by one the ciphertext data and the second quantum key that the server will receive from mobile device A Bit XOR operation to get plaintext data.6.根据权利要求1所述的一种用于移动设备的量子加密通信方法,其特征是:步骤六中所述服务器将第二量子密钥进行解密得到明文数据与第四量子密钥进行逐个比特异或运算,得到密文数据。6. a kind of quantum encryption communication method for mobile device according to claim 1, is characterized in that: described in step 6, the server decrypts the second quantum key to obtain plaintext data and the fourth quantum key one by one. Bit XOR operation to get ciphertext data.
CN201610907462.0A2016-10-192016-10-19 A quantum encrypted communication method for mobile devicesActiveCN106452750B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610907462.0ACN106452750B (en)2016-10-192016-10-19 A quantum encrypted communication method for mobile devices

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610907462.0ACN106452750B (en)2016-10-192016-10-19 A quantum encrypted communication method for mobile devices

Publications (2)

Publication NumberPublication Date
CN106452750A CN106452750A (en)2017-02-22
CN106452750Btrue CN106452750B (en)2019-05-03

Family

ID=58177030

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610907462.0AActiveCN106452750B (en)2016-10-192016-10-19 A quantum encrypted communication method for mobile devices

Country Status (1)

CountryLink
CN (1)CN106452750B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108737323B (en)*2017-04-132021-06-18山东量子科学技术研究院有限公司Digital signature method, device and system
CN107911211B (en)*2017-10-232020-11-17浙江神州量子网络科技有限公司Two-dimensional code authentication system based on quantum communication network
CN108449145B (en)*2018-03-212019-03-29广州大学A kind of ciphertext transmission method based on quantum key
CN109981270B (en)*2019-04-042021-06-22吉林工程技术师范学院 Peer-to-peer file transfer method based on quantum key synchronous destruction technology
CN112564892B (en)*2019-09-092022-02-22科大国盾量子技术股份有限公司Key distribution method, system and wearable device
CN111930325B (en)*2020-08-132022-09-23长春大学 A Secure Printing Method Based on Quantum Keys
CN117522417B (en)*2024-01-052024-04-26深圳市拓保软件有限公司Transaction security verification method and device based on quantum encryption

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103490891B (en)*2013-08-232016-09-07中国科学技术大学Key updating and the method for use in a kind of electrical network SSL VPN
JP6478749B2 (en)*2015-03-242019-03-06株式会社東芝 Quantum key distribution apparatus, quantum key distribution system, and quantum key distribution method
CN104780040A (en)*2015-04-062015-07-15安徽问天量子科技股份有限公司Handheld device encryption method and system based on quantum cryptography
CN105049201A (en)*2015-08-182015-11-11安徽问天量子科技股份有限公司Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography

Also Published As

Publication numberPublication date
CN106452750A (en)2017-02-22

Similar Documents

PublicationPublication DateTitle
CN106452750B (en) A quantum encrypted communication method for mobile devices
US7907735B2 (en)System and method of creating and sending broadcast and multicast data
CN105162599B (en)A kind of data transmission system and its transmission method
TWI536790B (en) Communication method using fingerprint information authentication
CN104219041A (en)Data transmission encryption method applicable for mobile internet
WO2018127118A1 (en)Identity authentication method and device
JP2007221204A (en)Wireless lan transmission reception apparatus and key delivery method in wireless lan
CN107993073B (en)Face recognition system and working method thereof
CN111416712B (en)Quantum secret communication identity authentication system and method based on multiple mobile devices
CN105282179A (en)Family Internet of things security control method based on CPK
CN109543434A (en)Block chain information encryption method, decryption method, storage method and device
CN101707767A (en) A data transmission method and device
CN107682152B (en) A Group Key Agreement Method Based on Symmetric Cipher
CN104639528A (en)DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device
CN109995785B (en)Quantum password-based method for safely unlocking files in local area network
Diallo et al.A secure authentication scheme for bluetooth connection
WO2013163861A1 (en)Method, device and system for proxy transformation
CN109845184A (en)A kind of data ciphering method and device of instant messaging
CN110022213A (en)A kind of more level of confidentiality processing methods based on quantum key protection computer data
WO2016206169A1 (en)Wireless access method, device and system, and storage medium
JP2009065226A (en) Authenticated key exchange system, authenticated key exchange method and program
CN111953675B (en)Key management method based on hardware equipment
CN112187460A (en)Master-slave network-oriented root key hidden symmetric encryption algorithm
US12406075B1 (en)System and method for scalable stream encryption and decryption
JP2002353954A (en)System and method of communication

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp