[go: up one dir, main page]

CN119814298A - Method and related device for encrypted communication of intercom - Google Patents

Method and related device for encrypted communication of intercom Download PDF

Info

Publication number
CN119814298A
CN119814298A CN202411971646.4A CN202411971646A CN119814298A CN 119814298 A CN119814298 A CN 119814298A CN 202411971646 A CN202411971646 A CN 202411971646A CN 119814298 A CN119814298 A CN 119814298A
Authority
CN
China
Prior art keywords
interphone
communication
session key
quantum session
transmission data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202411971646.4A
Other languages
Chinese (zh)
Inventor
李叶
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Benyuan Quantum Computing Technology Hefei Co ltd
Original Assignee
Benyuan Quantum Computing Technology Hefei Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Benyuan Quantum Computing Technology Hefei Co ltd filed Critical Benyuan Quantum Computing Technology Hefei Co ltd
Priority to CN202411971646.4A priority Critical patent/CN119814298A/en
Publication of CN119814298A publication Critical patent/CN119814298A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

本发明公开了一种对讲机加密通信的方法及相关装置,涉及量子加密通信技术领域,在确定待发送的第一数据后,可以利用第一量子会话密钥集合中的第一量子会话密钥对第一数据进行加密,从而获得第一密文;并可以根据第一量子会话密钥对应的标识和第一密文,生成第一传输数据,并将第一传输数据发送给服务端。由于第一对讲机中包括了多个量子会话密钥,并从多个量子会话密钥中选择一个量子会话密钥进行加密,这样,使得加密具备随机性,从而有助于增加破解难度,使得加密传输过程可以更加安全。

The present invention discloses a method and related device for encrypted communication of a walkie-talkie, and relates to the field of quantum encryption communication technology. After determining the first data to be sent, the first data can be encrypted using the first quantum session key in the first quantum session key set, thereby obtaining the first ciphertext; and the first transmission data can be generated according to the identifier corresponding to the first quantum session key and the first ciphertext, and the first transmission data is sent to the server. Since the first walkie-talkie includes multiple quantum session keys, and a quantum session key is selected from the multiple quantum session keys for encryption, the encryption is random, which helps to increase the difficulty of cracking and makes the encrypted transmission process safer.

Description

Interphone encryption communication method and related device
Technical Field
The invention belongs to the technical field of quantum encryption communication, and particularly relates to an interphone encryption communication method and a related device.
Background
With the development of science and technology, the life of users is also richer and more diversified, for example, at present, outdoor activities become a choice for daily recreation of users, and in some outdoor activities, users may be faced with grouping and then playing games and other interactions. Users in the same group may need to interact with information, and in the process of interacting with information, users typically interact with a lower-cost, more durable intercom.
In the process of information interaction of the interphone, the interphone sends the voice information to the server, and the server can forward the voice information to other members in the same group. However, the interphone will usually preset a plurality of channels, and the same group of users only need to set the interphone in the same channel (for example, all set to the a channel), so that the server side can determine which interphone to forward the voice information to according to the channel information corresponding to the received voice information. However, in this way, when a certain interphone of the other groups adjusts the channel to be the a channel, the voice information sent by the server can also be received.
Therefore, in the information transmission process of the existing interphone cluster, the risk of leakage of transmitted data is high.
Disclosure of Invention
The invention aims to provide a method and a related device for encrypting communication of interphones, wherein the interphones are grouped into communication clusters in advance, quantum session key sets among different communication clusters are different, and when the interphones need to send data, the data to be sent can be encrypted by utilizing a quantum session key in the quantum session key set stored in advance, so that ciphertext information is obtained, and thus, communication equipment among different communication clusters cannot decrypt the encrypted ciphertext information, and the safety of the communication equipment among the same communication clusters in the information interaction process is ensured.
In a first aspect, an embodiment of the present application provides a method for encrypting communications by using interphones, which is applied to a first interphone in a first communication cluster, where a plurality of interphones in the first communication cluster all include the same quantum session key set, the quantum session key sets included by the interphones in different communication clusters are different, and each interphone is communicatively connected to a server, and the method includes:
in response to receiving first data to be sent, encrypting the first data by using a first quantum session key in a quantum session key set included in the first interphone to obtain a first ciphertext;
Generating first transmission data based on the identifier corresponding to the first quantum session key and the first ciphertext, and sending the first transmission data to a server;
The server is used for sending the first transmission data to a second interphone;
Wherein, the second interphone comprises any one of the following:
interphone except the first interphone in the first communication cluster;
and the interphone is in the same communication channel with the first interphone.
Optionally, the number of times the first quantum session key is used is not greater than a preset number.
In a second aspect, an embodiment of the present application provides a method for encrypting communications by interphones, applied to a server, where the server is communicatively connected to a plurality of interphones, the plurality of interphones are divided into at least one communication cluster, the interphones belonging to the same communication cluster include the same quantum session key set, and the interphones belonging to different communication clusters include different quantum session key sets, and the method includes:
Determining a second interphone based on a first transmission channel adopted by the first interphone for transmitting the first transmission data in response to receiving the first transmission data transmitted by the first interphone in the first communication cluster, wherein the first transmission data is used for being generated by the first interphone in a mode that a first quantum session key in a quantum session key set included by the first interphone is utilized for encrypting the first data to obtain a first ciphertext;
and sending the first transmission data to the second interphone.
Optionally, one communication cluster corresponds to one transmission channel, and the determining, based on the first transmission channel used by the first intercom to send the first transmission data, the second intercom includes:
And if the transmission channel corresponding to the first communication cluster is the first transmission channel, determining the interphone which is except the first interphone and is currently in the first transmission channel as the second interphone.
Optionally, one communication cluster corresponds to one transmission channel, and the determining, based on the first transmission channel used by the first intercom to send the first transmission data, the second intercom includes:
If the transmission channel corresponding to the first communication cluster is a second transmission channel, determining whether the first transmission data comprises a predefined manager identifier, wherein the manager identifier is used for indicating that the interphone has cross-channel interaction authority;
And if the first transmission data does not include the manager identifier, determining the interphone except the first interphone in the first communication cluster as the second interphone.
Optionally, the server comprises a quantum session key set included in any interphone, and the method further comprises:
If the first transmission data includes the manager identifier, determining an interphone which is except the first interphone and is currently in the second transmission channel as the second interphone;
And transmitting the first transmission data to the second interphone, including:
decrypting the first ciphertext in the first transmission data by using the first quantum session key to obtain first data;
Determining a second quantum session key from a second quantum session set corresponding to the second transmission channel, and encrypting the first data by using the second quantum session key to obtain a second ciphertext;
Replacing the first quantum session key identifier and the first ciphertext in the first transmission data by using the second quantum session key identifier and the second ciphertext;
and sending the updated first transmission data to the second interphone.
In a third aspect, still another embodiment of the present application provides an apparatus for encrypting communications with an interphone, which is applied to a first interphone in a first communication cluster, where a plurality of interphones in the first communication cluster each include the same quantum session key set, the quantum session key sets included in the interphones in different communication clusters are different, each interphone is communicatively connected with a server, and the apparatus includes:
The encryption unit is used for encrypting the first data by utilizing a first quantum session key in a quantum session key set included in the first interphone in response to receiving the first data to be transmitted to obtain a first ciphertext;
The generation unit is used for generating first transmission data based on the identifier corresponding to the first quantum session key and the first ciphertext and sending the first transmission data to a server;
The server is used for sending the first transmission data to a second interphone;
Wherein, the second interphone comprises any one of the following:
interphone except the first interphone in the first communication cluster;
and the interphone is in the same communication channel with the first interphone.
In a fourth aspect, a further embodiment of the present application provides an apparatus for encrypting communications by interphones, applied to a server, where the server is communicatively connected to a plurality of interphones, the plurality of interphones are divided into at least one communication cluster, the interphones belonging to the same communication cluster include the same quantum session key set, and the interphones belonging to different communication clusters include different quantum session key sets, and the apparatus includes:
the determining unit is used for responding to the received first transmission data sent by the first interphone in the first communication cluster, determining a second interphone based on a first transmission channel adopted by the first interphone for sending the first transmission data, wherein the first transmission data is used for being generated by the first interphone in a mode that the first data is encrypted by using a first quantum session key in a quantum session key set included in the first interphone to obtain a first ciphertext;
And the sending unit is used for sending the first transmission data to the second interphone.
In a fifth aspect, still another embodiment of the present application provides a storage medium having a computer program stored therein, wherein the computer program is configured to perform the method of encrypting communications for interphones described above when executed.
In a sixth aspect, a further embodiment of the present application provides an electronic device, including a memory, in which a computer program is stored, and a processor configured to run the computer program to perform the method of intercom encrypted communication.
Compared with the prior art, the method and the related device for encrypting communication of the interphone have the advantages that after the first interphone determines the first data to be transmitted, the first interphone can encrypt the first data by using the first quantum session key in the first quantum session key set to obtain the first ciphertext, and can generate first transmission data according to the identifier corresponding to the first quantum session key and the first ciphertext and can transmit the first transmission data to the server. Because the first interphone comprises a plurality of quantum session keys, and one quantum session key is selected from the plurality of quantum session keys for encryption, the selection of the quantum session keys has randomness, so that the cracking difficulty is increased, and the encryption transmission process can be safer. And the server sends the first transmission data to the second interphone, if the second interphone of the received first transmission data is not divided into the same communication cluster with the first interphone in advance, the first data can not be obtained obviously because of the absence of the first quantum session key. Meanwhile, the first ciphertext in the first transmission data is obtained by encrypting the first quantum session key, so that the first ciphertext is difficult to crack.
That is, the communication interaction between interphones which perform network communication by using the server is safer by the method disclosed by the invention.
Drawings
Fig. 1 is a schematic flow chart of a method for encrypting communication of interphone according to an embodiment of the present invention;
Fig. 2 is a flow chart of another method for encrypting communication of interphone according to an embodiment of the present invention;
Fig. 3 is an interaction schematic diagram of an interphone and a server provided by an embodiment of the present invention;
fig. 4 is a schematic connection diagram of another device for encrypting intercom communication according to an embodiment of the present invention;
Fig. 5 is a connection schematic diagram of an apparatus for encrypting intercom communication according to an embodiment of the present invention;
Fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
As can be seen from the description of the background art, the interphone will generally preset a plurality of channels, and in the related art, the interphone in the same communication cluster may be preset to use the same communication channel, so that when the server side receives the communication data, the server side may forward the communication data according to the communication channel to the interphone in the same communication channel, thereby implementing communication interaction between the interphones in the same communication channel.
However, in some scenarios, it may be desirable that only certain users can receive communication data, and no other users receive communication data (i.e., it may be desirable that only interphones within the same communication cluster can interact with information, but not interphones of the same communication cluster cannot interact with information). For example, during field training activities, the training staff may be grouped, and it is desirable to communicate between users in the group, while communication between users in different groups is not desirable, in which case the solution in the related art is difficult to implement. The server determines to transmit the data in the corresponding channel according to the channel corresponding to the received data, so that the interphone in the same channel can receive the information, and at the moment, when the interphone is adjusted to the same channel by the user preset as different groups, the transmitted data can be received.
For example, when the group a and the group B play a field training game, the members of the group a use the interphone to communicate on the channel a, and the members of the group B use the interphone to communicate on the channel B, and if a certain member of the group a uses the interphone on the channel B, communication data between the members of the group B may also be received.
That is, the communication method in the related art cannot guarantee the communication security between clusters.
In the embodiment of the disclosure, the interphone performs grouping of communication clusters in advance, quantum session key sets among different communication clusters are different, when the interphone needs to send data, a certain quantum session key in the pre-stored quantum session key set can be used for encrypting the data needing to be sent, so that ciphertext information is obtained, and thus communication equipment among different communication clusters cannot decrypt the encrypted ciphertext information, and the safety of communication equipment among the same communication clusters in the information interaction process is ensured.
Referring to fig. 1, fig. 1 is a schematic flow chart of an intercom encrypted communication method provided by an embodiment of the present invention, where the intercom encrypted communication method may be applied to a first intercom in a first communication cluster, a plurality of intercoms in the first communication cluster all include the same quantum session key set, the quantum session key sets included in the intercoms in different communication clusters are different, and each intercom is connected with a server in a communication manner.
It should be noted that, in the actual use process, there may be a plurality of communication clusters, in this embodiment, only the communication of one of the plurality of communication clusters is described, and the communication modes adopted by other communication clusters in the plurality of communication clusters may be the same as the communication mode disclosed in this embodiment, so that the communication mode of one of the communication clusters (the first communication cluster) is selected in this disclosure to describe in detail, so as to facilitate understanding the data transmission process of the interphone in the communication cluster of this disclosure.
It should be understood that the number of interphones in each communication cluster may be different, and the number of interphones in each communication cluster may be defined according to practical situations.
It should be noted that, quantum session key sets included in the interphones in different communication clusters are different, for example, the communication cluster a includes An interphone A1 and An interphone a2. The interphone A1 and the interphone A2 are respectively a quantum session key set A, the interphone B1 and the interphone B2 are respectively a quantum session key set B, and the quantum session key set A and the quantum session key set B can be different, so that after the quantum session key in the quantum session key set A encrypts ciphertext information A obtained by encrypting data, the quantum session key in the quantum session key set B can not decrypt the ciphertext information A, and correspondingly, the quantum session key in the quantum session key set A can not decrypt the ciphertext information obtained by encrypting the quantum session key in the quantum session key set B. In this way, communication equipment among different communication clusters cannot interact, so that the safety of the preset interphone among the same group of communication clusters in the information interaction process is ensured.
As shown in fig. 1, the method for encrypting communication by the interphone can include the following steps:
step 101, in response to receiving first data to be transmitted, encrypting the first data by using a first quantum session key in a quantum session key set included in a first interphone to obtain a first ciphertext;
step 102, based on the identifier corresponding to the first quantum session key and the first ciphertext, generating first transmission data, and sending the first transmission data to the server.
The server is used for sending the first transmission data to the second interphone.
Wherein the second interphone comprises any one of the following:
Interphone except the first interphone in the first communication cluster;
an intercom that is in the same communication channel as the first intercom.
It should be understood that the service side may determine, in advance, the communication cluster in which the first interphone is located, so as to implement that the first transmission data is sent to some interphones in a directional manner, in this way, the first transmission data may be prevented from being sent to the interphones that do not belong to the first communication cluster, and the interphones that are in the predefined same communication cluster may not use the same communication channel for communication.
As an example, after the communication clusters are determined in advance, the interphone in the same communication cluster should use the same channel, so that the interphone in the same communication channel as the first interphone may be directly determined as the second interphone, and thus, the server may not need to store the interphone corresponding to each communication cluster, but only need to directly transmit according to the communication channel. Meanwhile, the method also ensures that the server is not required to be notified every time the predefined communication cluster is changed, and the server only needs to perform corresponding forwarding work according to the communication channel, so that the whole flow is simpler.
As an example, the quantum session key may be understood as a session key generated based on a quantum random number and a quantum key distribution protocol, and a ciphertext obtained after data encryption by using the quantum session key, so that the ciphertext has a certain capability of resisting cracking of a quantum computer, thereby being beneficial to making the ciphertext obtained after data encryption by using the quantum session key safer.
As an example, the quantum session key set may include a plurality of quantum session keys, so that different quantum session keys may be used in each information transmission process, and thus, a large number of times of cracking may be required for data in an interaction process, and it may also be understood that, since each piece of information is encrypted by using a different quantum session key, cracking is required from scratch for each piece of ciphertext data, which obviously greatly increases cracking difficulty, and thus, the encrypted communication process may be safer.
As an example, the quantum session key sets included by the walkie-talkies in different communication clusters may be different, it being understood that the same quantum session key is not included in different quantum session key sets. In this way, different communication clusters can be made incapable of decrypting each other.
As an example, the first interphone includes a quantum session key set, so that the first interphone includes a plurality of quantum session keys, one quantum session key can be determined from the quantum session key set and is determined to be the first quantum session key, and the identifier corresponding to the first quantum session key and the first ciphertext can be combined and packaged to generate first transmission data, so that after the server sends the first transmission data to the second interphone, the second interphone can efficiently determine the first quantum session key in the first quantum session key set according to the identifier corresponding to the first quantum session key, thereby realizing efficient decryption of the first ciphertext.
As an example, the first intercom may have a plurality of transmission channels, and the first transmission channel may be a predefined transmission channel. Correspondingly, interphones which are located in the same transmission channel with the first interphone can be understood as the same communication cluster, and the interphones and the first interphone have the same quantum session key set, so that the server side can send first transmission data to the interphones which are located in the first transmission channel except the first interphone, and the interphones which are located in the first transmission channel except the first interphone can decrypt the first ciphertext by utilizing the first quantum session key in the first quantum session key set, thereby obtaining the first data.
In the disclosure, after determining the first data to be transmitted, the first interphone may encrypt the first data by using a first quantum session key in the first quantum session key set, so as to obtain a first ciphertext, and may generate first transmission data according to an identifier corresponding to the first quantum session key and the first ciphertext, and may transmit the first transmission data to the server. Because the first interphone comprises a plurality of quantum session keys, and one quantum session key is selected from the plurality of quantum session keys for encryption, the selection of the quantum session keys has randomness, so that the cracking difficulty is increased, and the encryption transmission process can be safer. And the server sends the first transmission data to the second interphone, if the second interphone of the received first transmission data is not divided into the same communication cluster with the first interphone in advance, the first data can not be obtained obviously because of the absence of the first quantum session key. Meanwhile, the first ciphertext in the first transmission data is obtained by encrypting the first quantum session key, so that the first ciphertext is difficult to crack.
That is, the communication interaction between interphones which perform network communication by using the server is safer by the method disclosed by the invention.
In some embodiments, the first quantum session key is used no more than a preset number of times.
As an example, the preset number may be 2 or 1. That is, it can be understood that the first quantum session key is used only a small number of times.
As an example, the number of uses of the first quantum session key as the encryption key may be understood as the number of times of encryption or decryption with the first quantum session key. That is, in the process of communication of each interphone in the communication cluster, one interphone uses one quantum session key for encryption, and then the other interphone uses the quantum session key for decryption. Thus, the number of times a quantum session key is used can be understood as the number of times the quantum session key is used by one interphone for encryption or decryption. For example, when the preset number is 2, the first quantum session key is used at most twice for encryption or decryption, or used for encryption and decryption once, so that a plurality of different quantum session keys can be used in a plurality of data interaction processes in the communication process, and the difficulty of cracking the interaction data can be increased.
As an example, the number of quantum session keys in the quantum session key set may be set according to the actual situation. For example, in some scenarios, the communication devices in the communication cluster may need frequent dialogue communication, and the number of quantum session keys in the quantum session key set may be set to be much larger, and correspondingly, in the case where the communication devices in the communication cluster dialogue less frequently and only need to dialogue for a short time, the number of quantum session keys in the quantum session key set may be set to be smaller.
It should be understood that a quantum session key set may be understood as a string of a number of characters, while a quantum session key may be understood as part of the string. For example, a quantum session key set is a string of 10 ten thousand characters, where every 16 consecutive characters constitutes a quantum session key.
Referring to fig. 2, fig. 2 is a flow chart of a method for encrypting communication of interphones, which is provided by the embodiment of the invention, and is applied to a server, wherein the server is in communication connection with a plurality of interphones, the plurality of interphones are divided into at least one communication cluster, quantum session key sets included in the interphones belonging to the same communication cluster are the same, and quantum session key sets included in the interphones belonging to different communication clusters are different.
As shown in fig. 2, the method for encrypting communication by the interphone may include the following steps:
step 201, in response to receiving first transmission data sent by a first interphone in a first communication cluster, determining a second interphone based on a first transmission channel adopted by the first interphone to send the first transmission data;
step 202, the first transmission data is sent to the second interphone.
The first transmission data are used for being generated by the first interphone in a mode that the first data are encrypted by using a first quantum session key in a quantum session key set included in the first interphone to obtain a first ciphertext, and the first transmission data are generated based on an identifier corresponding to the first quantum session key and the first ciphertext.
It should be understood that the process of generating the first transmission data by the first intercom is described in detail in the foregoing embodiments, and for brevity of description, details are not repeated here.
As an example, the second intercom includes any of the following:
Interphone except the first interphone in the first communication cluster;
an intercom that is in the same communication channel as the first intercom.
As an example, the server may store the correspondence between the communication clusters and the interphones in advance, and at this time, determining the interphone except the first interphone in the first communication cluster as the second interphone may be adopted. The server may not store the correspondence between the communication clusters and the interphones, and in this case, the interphone that is in the same communication channel as the first interphone may be determined as the second interphone.
As an example, since the interphones perform the division of the communication clusters in advance, the interphones of the same communication cluster have the same quantum session key set, whereas the interphones of different communication clusters do not have the same quantum session key, so that only the interphones predefined as the same communication cluster can perform communication. That is, in the process of forwarding communication data by using the server, the communication security of the same communication cluster can be ensured.
In some embodiments, one communication cluster corresponds to one transmission channel, and the determining the second interphone based on the first transmission channel used by the first interphone to send the first transmission data in step 201 may specifically include:
if the transmission channel corresponding to the first communication cluster is the first transmission channel, the interphone which is except the first interphone and is currently located in the first transmission channel can be determined to be the second interphone.
As an example, if the transmission channel corresponding to the first communication cluster is the first transmission channel, the first intercom may be characterized as first transmission data sent by the first intercom with the originally agreed transmission channel, and at this time, the intercom that is other than the first intercom and is currently in the first transmission channel may be determined as the second intercom.
As an example, this way, the server does not need to pay attention to which specific interphones are initially in the same communication cluster, and thus the efficiency of determining the second interphone can be improved, so that the first transmission data can be sent to the second interphone more efficiently.
In some embodiments, one communication cluster corresponds to one transmission channel, and the determining the second interphone based on the first transmission channel used by the first interphone to send the first transmission data in step 201 may specifically include:
And if the transmission channel corresponding to the first communication cluster is the first transmission channel, determining the interphone except the first interphone in the first communication cluster as the second interphone.
As an example, the service side is required to store the interphones corresponding to the communication clusters in advance, which brings the advantage that when a certain interphone in the first communication cluster is not set as the first transmission channel according to the preset convention, the first transmission data sent by the first interphone in the first communication cluster can be obtained.
In some embodiments, one communication cluster corresponds to one transmission channel, and the determining the second interphone based on the first transmission channel used by the first interphone to send the first transmission data in step 201 may specifically include:
If the transmission channel corresponding to the first communication cluster is the second transmission channel, determining whether the first transmission data comprises a predefined manager identification; and if the first transmission data does not comprise the manager identifier, determining the interphone except the first interphone in the first communication cluster as the second interphone.
Here, the manager identification is used to indicate that the interphone has cross-channel interaction rights.
As an example, a certain intercom may belong to a main intercom, which may communicate with each intercom, only the main intercom being divided into the first communication clusters in advance. Therefore, when the first transmission data includes the manager identifier, the first interphone may be represented as the master interphone, and correspondingly, when the first transmission data does not include the manager identifier, the first interphone may be represented as not the master interphone, only when the first interphone does not perform data transmission according to the predefined transmission channel, the server side may directly determine the interphones except the first interphone in the first communication cluster as the second interphone, so that the interphone originally determined as the first communication cluster may receive the information sent by the first interphone.
In some embodiments, the server includes a quantum session key set included in any interphone, and the method may further include determining an interphone that is other than the first interphone and is currently in the second transmission channel as the second interphone if the first transmission data includes the manager identifier;
and transmitting the first transmission data to the second interphone, comprising:
decrypting a first ciphertext in the first transmission data by using the first quantum session key to obtain first data;
determining a second quantum session key from a second quantum session set corresponding to the second transmission channel, and encrypting the first data by using the second quantum session key to obtain a second ciphertext;
replacing the first quantum session key identification and the first ciphertext in the first transmission data by using the second quantum session key identification and the second ciphertext;
And sending the updated first transmission data to the second interphone.
As an example, when the first transmission data includes the manager identifier, the first interphone may be represented as the master interphone, and at this time, the master interphone may be represented as the interphone that may need to send information with the interphones of other communication clusters.
As an example, the server may determine, according to the communication channel adopted by the master interphone, the second interphone to which the data needs to be sent.
As an example, since quantum session keys corresponding to different communication clusters are different, one communication cluster corresponds to one transmission channel, and thus, one transmission channel corresponds to one quantum session key, and quantum session keys corresponding to different transmission channels are different. For example, a first communication cluster corresponds to a first transmission channel, to a first set of quantum session keys, and a second communication cluster may correspond to a second transmission channel, to a second set of quantum session keys.
Therefore, when the first transmission data is directly sent to the second interphone in the second communication cluster, the second interphone cannot decrypt the first ciphertext information in the first transmission data.
The server may pre-store a quantum session key set included in each communication cluster, and when the server determines that the first interphone is a master interphone and needs to send information to a second interphone in a second communication cluster, the server may decrypt the first ciphertext to obtain first data, encrypt the first data with the second quantum session key to obtain second ciphertext, replace the first quantum session key identifier and the first ciphertext in the first transmission data with the second quantum session key identifier and the second ciphertext, and obtain updated first transmission data, so that the updated first transmission data is sent to the second interphone, and the second interphone may normally decrypt the second ciphertext information to obtain the first data.
Therefore, in the present disclosure, under normal conditions, the server does not need to decrypt the first ciphertext information in the first transmission data, and only when the first interphone is the main interphone and the transmission channel adopted by the first interphone is different from the transmission channel corresponding to the pre-allocated communication cluster, the first ciphertext in the first transmission data needs to be encrypted, and the second quantum session key (the quantum session key included by the receiver) is used for re-encrypting, so that not only is the security of cluster communication protected, but also the main interphone can separately send information to different clusters, and the applicability is improved.
That is, in a normal case, only the interphone of the same communication cluster can perform information interaction, but when a main interphone needs to call, the main interphone can call across the communication cluster, and only the quantum session key set corresponding to the pre-allocated communication cluster needs to be stored. That is, the method of the present disclosure greatly improves security between trunking communications and ensures applicability.
It should be understood that the encryption algorithm adopted in the encryption process of the present disclosure may be a hybrid algorithm, that is, a hybrid algorithm of a post quantum algorithm and a national encryption algorithm, or a hybrid algorithm of a post quantum algorithm and an international algorithm, which is helpful to make the difficulty of cracking ciphertext information obtained by encryption larger.
It should be appreciated that international algorithms generally refer to cryptographic algorithm standards established by international standardization organizations such as ISO (International Organization for Standardization, international standardization organization), IEC (International Electrotechnical Commission ), ITU (International Telecommunication Union, international telecommunication union), etc., or industry alliance such as IETF (INTERNET ENGINEERING TASK Force ). The international algorithm may include, but is not limited to, symmetric cryptographic algorithms, asymmetric encryption algorithms, digest algorithms, digital signature algorithms, and the like.
The national cryptographic algorithm is generally referred to as a series of domestic cryptographic algorithm standards that are recognized and promulgated by the national cryptographic authority. The cryptographic algorithm may include, but is not limited to, a symmetric encryption algorithm, an asymmetric encryption algorithm based on elliptic curve cryptography, a block cipher algorithm.
Post quantum algorithms, also known as Post-Quantum Cryptography, PQC, refer to encryption algorithms that remain secure even in the presence of quantum computers. Post quantum algorithms may include, but are not limited to, (1) lattice-based cryptographic algorithms, (2) encoding-based cryptographic algorithms, (3) multivariate-based cryptographic algorithms, and (4) hash-based signature algorithms. Of course, the specific post quantum cryptography algorithm may be defined according to the actual situation.
The hybrid algorithm based on the post quantum algorithm and the national cryptographic algorithm can be understood as integrating the post quantum key packaging algorithm on the basis of the national cryptographic algorithm to obtain the final session negotiation key. The mixing method can obviously reduce the potential risk, thereby having the capability of resisting key cracking by a quantum computer to a certain extent. In the double signature mode, after the message is signed by using the traditional public key cryptographic algorithm, the message (which can comprise the traditional cryptographic signature result) can be signed by using the post-quantum public key cryptographic algorithm, and the combination of the two signature results is output. Or the signature sequence is exchanged, the signature is carried out by a quantum public key cryptographic algorithm, and then the signature is carried out by a traditional public key cryptographic algorithm. And when the verification is performed, only if the two sections of signature results are verified successfully, the verification is considered to be successful. This approach ensures that even if one of the algorithms is broken, the other algorithm can still provide security.
Of course, the hybrid encryption mode of the hybrid algorithm based on the post quantum algorithm and the international algorithm, and the hybrid encryption mode of the hybrid algorithm based on the post quantum algorithm, the national encryption algorithm and the international algorithm can be similar to the hybrid encryption mode based on the post quantum algorithm and the national encryption algorithm, and for the sake of brevity of the description, the description is omitted here.
It should be understood that, due to development of quantum computing, when the conventional encryption means is used for encrypting data, the possibility of being cracked by a quantum computer is high, so in the disclosure, the ciphertext information after encryption can resist the cracking of the quantum computer by adopting a hybrid algorithm, and meanwhile, the cracking of a classical computer can also be resisted by adopting a national encryption algorithm.
Referring to fig. 3, fig. 3 can be understood as an interaction diagram of the interphone and the server, and as can be seen from fig. 3, the interphone does not directly communicate with each other, but forwards information through the server, so that the communication distance between the communication clusters can be increased, and the communication is more stable.
In some embodiments, one interphone may correspond to one secure digital memory card, which may be used to store the quantum session key set loaded by the key distribution terminal.
As an example, since the secure digital memory card can be inserted into the interphone, the quantum session key set is stored through the secure digital memory card, so that the key distribution terminal only needs to distribute the quantum session key to the secure memory card, and in the actual use process, only needs to insert the secure digital memory card into the corresponding interphone. This approach may make it more convenient for the interphone to obtain the quantum session key, and to update the quantum session key (e.g., by updating a secure digital memory card).
By way of example, secure digital memory cards may include, but are not limited to, memory cards, SIM cards, and the like.
Meanwhile, it is particularly emphasized that the quantum computer is a physical device for performing high-speed mathematical and logical operation, storing and processing quantum information according to the law of quantum mechanics. When a device processes and calculates quantum information and operates on a quantum algorithm, the device is a quantum computer. Quantum computers are a key technology under investigation because of their ability to handle mathematical problems more efficiently than ordinary computers, for example, to accelerate the time to crack RSA keys from hundreds of years to hours.
That is, with the development of quantum technology, the effect of the protection means in the existing communication process may not be ideal, that is, the protection means in the traditional communication process is difficult to resist the attack of the quantum computer, while in the present disclosure, when the interphone encrypts the data, the interphone uses the quantum session key and encrypts by using the hybrid encryption algorithm, so that the attack of the quantum computer can be resisted to a certain extent, and the security of the communication process is enhanced.
In some implementations, the hybrid encryption algorithm may also be pre-stored in the secure digital memory card.
In some implementations, the application scenario of the present disclosure may be applied to military drill scenarios, for example, where it may be required to face division into multiple teams, where information interaction may be possible between members of the same team, and information interaction may not be possible between members of different teams, and this need may be obviously satisfied by using the manner of the present disclosure.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an apparatus for encrypting intercom encrypted communication according to an embodiment of the present invention, where the apparatus 400 for intercom encrypted communication is applied to a first intercom in a first communication cluster, a plurality of intercoms in the first communication cluster each include the same quantum session key set, the quantum session key sets included in the intercoms in different communication clusters are different, each intercom is communicatively connected with a server, and the apparatus 400 includes:
an encryption unit 401, configured to encrypt, in response to receiving first data to be sent, the first data with a first quantum session key in a quantum session key set included in the first interphone, to obtain a first ciphertext;
A generating unit 402, configured to generate first transmission data based on the identifier corresponding to the first quantum session key and the first ciphertext, and send the first transmission data to a server;
The server is used for sending the first transmission data to a second interphone;
Wherein, the second interphone comprises any one of the following:
interphone except the first interphone in the first communication cluster;
and the interphone is in the same communication channel with the first interphone.
In some embodiments, the number of times the first quantum session key is used is not greater than a preset number.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an apparatus for encrypting intercom communication according to an embodiment of the present invention, where the apparatus 500 for intercom encryption communication is applied to a server, and the server is communicatively connected to a plurality of intercom units, and the plurality of intercom units are divided into at least one communication cluster, and quantum session key sets included in intercom units belonging to the same communication cluster are the same, and quantum session key sets included in intercom units belonging to different communication clusters are different, and the apparatus 500 includes:
A determining unit 501, configured to determine, in response to receiving first transmission data sent by a first intercom in a first communication cluster, a second intercom based on a first transmission channel adopted by the first intercom to send the first transmission data, where the first transmission data is used for being generated by the first intercom, by encrypting, by using a first quantum session key in a quantum session key set included in the first intercom, the first data to obtain a first ciphertext;
And a transmitting unit 502, configured to transmit the first transmission data to the second intercom.
In some embodiments, one communication cluster corresponds to one transmission channel, and the determining unit 501 is specifically further configured to:
And if the transmission channel corresponding to the first communication cluster is the first transmission channel, determining the interphone which is except the first interphone and is currently in the first transmission channel as the second interphone.
In some embodiments, one communication cluster corresponds to one transmission channel, and the determining unit 501 is specifically further configured to:
If the transmission channel corresponding to the first communication cluster is a second transmission channel, determining whether the first transmission data comprises a predefined manager identifier, wherein the manager identifier is used for indicating that the interphone has cross-channel interaction authority;
And if the first transmission data does not include the manager identifier, determining the interphone except the first interphone in the first communication cluster as the second interphone.
In some embodiments, the server includes a quantum session key set included in any interphone, and the determining unit 501 is specifically further configured to:
If the first transmission data includes the manager identifier, determining an interphone which is except the first interphone and is currently in the second transmission channel as the second interphone;
And transmitting the first transmission data to the second interphone, including:
decrypting the first ciphertext in the first transmission data by using the first quantum session key to obtain first data;
Determining a second quantum session key from a second quantum session set corresponding to the second transmission channel, and encrypting the first data by using the second quantum session key to obtain a second ciphertext;
Replacing the first quantum session key identifier and the first ciphertext in the first transmission data by using the second quantum session key identifier and the second ciphertext;
and sending the updated first transmission data to the second interphone.
Fig. 6 shows a schematic structural diagram of a computer device according to an embodiment of the present application, where the computer device includes a memory and a processor, and the memory stores a computer program, and the processor implements the functions of the computer system of the method for generating the amplitude preparation circuit in any of the above embodiments when executing the computer program.
The embodiment of the present application also provides a computer-readable storage medium having stored thereon a computer program that, when executed by a computer, causes the computer to perform the functions of the computer system of the method for encrypting intercom communication in any of the above embodiments.
The present application also provides a computer program product containing instructions that, when executed by a computer, cause the computer to perform the functions of the computer system of the method for encrypting intercom communication in any of the above embodiments.
It will be appreciated that the specific examples of the application are intended to aid those skilled in the art in better understanding the embodiments of the application and are not intended to limit the scope of the application.
It should be understood that, in various embodiments of the present application, the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
It will be appreciated that the various embodiments described in the present application may be implemented either alone or in combination, and that the embodiments of the present application are not limited in this regard.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to limit the scope of the present application. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It will be appreciated that the processor of an embodiment of the application may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method embodiments may be implemented by integrated logic circuits of hardware in a processor or instructions in software form. The Processor may be a general purpose Processor, a digital signal Processor (DIGITAL SIGNAL Processor, DSP), an Application SPECIFIC INTEGRATED Circuit (ASIC), an off-the-shelf programmable gate array (Field Programmable GATE ARRAY, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware decoding processor for execution, or in a combination of hardware and software modules in a decoding processor for execution. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
It will be appreciated that the memory in embodiments of the application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an erasable programmable ROM (erasable PROM, EPROM), an Electrically Erasable Programmable ROM (EEPROM), or a flash memory, among others. The volatile memory may be Random Access Memory (RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described system, apparatus and unit may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical function division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present application. The storage medium includes a U disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The foregoing is merely illustrative embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about variations or substitutions within the technical scope of the present application, and the application should be covered. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (10)

1. The method for encrypting communication of interphones is characterized by being applied to a first interphone in a first communication cluster, wherein a plurality of interphones in the first communication cluster all comprise the same quantum session key set, the quantum session key sets included in the interphones in different communication clusters are different, each interphone is in communication connection with a server, and the method comprises the following steps:
in response to receiving first data to be sent, encrypting the first data by using a first quantum session key in a quantum session key set included in the first interphone to obtain a first ciphertext;
generating first transmission data based on the identifier corresponding to the first quantum session key and the first ciphertext, and sending the first transmission data to a server;
the server side is used for sending the first transmission data to a second interphone;
Wherein, the second intercom includes any one of the following:
interphone except the first interphone in the first communication cluster;
And the interphone is in the same communication channel with the first interphone.
2. The method of claim 1, wherein the first quantum session key is used no more than a preset number of times.
3. The method for encrypting communication of interphones is characterized by being applied to a server, wherein the server is in communication connection with a plurality of interphones, the interphones are divided into at least one communication cluster, quantum session key sets included in the interphones in the same communication cluster are the same, quantum session key sets included in the interphones in different communication clusters are different, and the method comprises the following steps:
Determining a second interphone based on a first transmission channel adopted by the first interphone for transmitting the first transmission data in response to receiving the first transmission data transmitted by the first interphone in a first communication cluster, wherein the first transmission data is used for being generated by the first interphone in such a way that the first data is encrypted by using a first quantum session key in a quantum session key set included in the first interphone to obtain a first ciphertext;
And sending the first transmission data to the second interphone.
4. The method of claim 3, wherein one communication cluster corresponds to one transmission channel, and wherein the determining the second intercom based on the first transmission channel employed by the first intercom to transmit the first transmission data comprises:
And if the transmission channel corresponding to the first communication cluster is the first transmission channel, determining the interphone which is except the first interphone and is currently positioned in the first transmission channel as the second interphone.
5. The method of claim 3, wherein one communication cluster corresponds to one transmission channel, and wherein the determining the second intercom based on the first transmission channel employed by the first intercom to transmit the first transmission data comprises:
If the transmission channel corresponding to the first communication cluster is a second transmission channel, determining whether the first transmission data comprises a predefined manager identifier, wherein the manager identifier is used for indicating that the interphone has cross-channel interaction authority;
and if the first transmission data does not comprise the manager identifier, determining the interphone except the first interphone in the first communication cluster as the second interphone.
6. The method of claim 5, wherein the server includes a quantum session key set included in any interphone, and wherein the method further comprises:
If the first transmission data comprises an administrator identifier, determining an interphone which is except the first interphone and is currently in the second transmission channel as the second interphone;
And sending the first transmission data to the second interphone, including:
decrypting the first ciphertext in the first transmission data by using the first quantum session key to obtain first data;
determining a second quantum session key from a second quantum session set corresponding to the second transmission channel, and encrypting the first data by using the second quantum session key to obtain a second ciphertext;
Replacing the first quantum session key identification and the first ciphertext in the first transmission data with the second quantum session key identification and the second ciphertext;
and sending the updated first transmission data to the second interphone.
7. The utility model provides a device of intercom encryption communication, its characterized in that is applied to the first intercom in the first communication cluster, a plurality of intercoms in the first communication cluster all include the same quantum conversation key set, and the quantum conversation key set that the intercom that includes in different communication clusters is different, and each intercom all is connected with the server communication, and, the device includes:
The encryption unit is used for encrypting the first data by utilizing a first quantum session key in a quantum session key set included in the first interphone in response to receiving the first data to be transmitted, so as to obtain a first ciphertext;
The generation unit is used for generating first transmission data based on the identification corresponding to the first quantum session key and the first ciphertext, and sending the first transmission data to a server;
the server side is used for sending the first transmission data to a second interphone;
Wherein, the second intercom includes any one of the following:
interphone except the first interphone in the first communication cluster;
And the interphone is in the same communication channel with the first interphone.
8. The device for encrypting communication of interphones is characterized by being applied to a service end, wherein the service end is in communication connection with a plurality of interphones, the interphones are divided into at least one communication cluster, quantum session key sets included in the interphones in the same communication cluster are identical, quantum session key sets included in the interphones in different communication clusters are different, and the device comprises:
The system comprises a determining unit, a first transmitting unit, a second transmitting unit and a first receiving unit, wherein the determining unit is used for responding to received first transmission data sent by a first interphone in a first communication cluster and determining a second interphone based on a first transmission channel adopted by the first interphone for sending the first transmission data, the first transmission data are used for being generated by the first interphone in a mode that the first interphone encrypts the first data by utilizing a first quantum session key in a quantum session key set included by the first interphone to obtain a first ciphertext;
and the sending unit is used for sending the first transmission data to the second interphone.
9. A storage medium having a computer program stored therein, wherein the computer program is arranged to perform the method of any of claims 1-2 or the method of any of claims 3-6 when run.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the method of any of the claims-2 or the method of any of the claims 3-6.
CN202411971646.4A 2024-12-30 2024-12-30 Method and related device for encrypted communication of intercom Pending CN119814298A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411971646.4A CN119814298A (en) 2024-12-30 2024-12-30 Method and related device for encrypted communication of intercom

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411971646.4A CN119814298A (en) 2024-12-30 2024-12-30 Method and related device for encrypted communication of intercom

Publications (1)

Publication Number Publication Date
CN119814298A true CN119814298A (en) 2025-04-11

Family

ID=95258870

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411971646.4A Pending CN119814298A (en) 2024-12-30 2024-12-30 Method and related device for encrypted communication of intercom

Country Status (1)

Country Link
CN (1) CN119814298A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140281529A1 (en) * 2013-03-18 2014-09-18 Edward C. Epp Key refresh between trusted units
CN104394602A (en) * 2014-12-15 2015-03-04 哈尔滨海能达科技有限公司 Cross-system call setup method, terminal and core network element
CN106303989A (en) * 2016-08-25 2017-01-04 深圳市轱辘车联数据技术有限公司 A kind of intercommunication method based on mobile terminal and mobile terminal
CN206865494U (en) * 2017-04-17 2018-01-09 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system based on quantum key service station
CN113612608A (en) * 2021-08-13 2021-11-05 中电信量子科技有限公司 Method and system for realizing cluster encryption of dual-mode interphone based on public network
CN117640084A (en) * 2023-12-07 2024-03-01 中电信量子科技有限公司 Method, gateway and system for protecting communication data by quantum encryption

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140281529A1 (en) * 2013-03-18 2014-09-18 Edward C. Epp Key refresh between trusted units
CN104394602A (en) * 2014-12-15 2015-03-04 哈尔滨海能达科技有限公司 Cross-system call setup method, terminal and core network element
CN106303989A (en) * 2016-08-25 2017-01-04 深圳市轱辘车联数据技术有限公司 A kind of intercommunication method based on mobile terminal and mobile terminal
CN206865494U (en) * 2017-04-17 2018-01-09 江苏亨通问天量子信息研究院有限公司 Secrecy intercom system based on quantum key service station
CN113612608A (en) * 2021-08-13 2021-11-05 中电信量子科技有限公司 Method and system for realizing cluster encryption of dual-mode interphone based on public network
CN117640084A (en) * 2023-12-07 2024-03-01 中电信量子科技有限公司 Method, gateway and system for protecting communication data by quantum encryption

Similar Documents

Publication Publication Date Title
Diffie et al. New directions in cryptography
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
Berson Skype security evaluation
US20110194698A1 (en) Key Sharing System
Bergsma et al. Multi-ciphersuite security of the Secure Shell (SSH) protocol
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
US20230239144A1 (en) Deterministic chaos-based quantum computer resistant data encryption for large scale wide area network solutions
CN111526131B (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
CN119276494A (en) Session key generation method and related device
CN107483429A (en) A kind of data ciphering method and device
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
CN111049738A (en) E-mail data security protection method based on hybrid encryption
CN115834038A (en) Encryption method and device based on national commercial cryptographic algorithm
CN112039670A (en) Construction method, device and system of post-quantum enhanced encryption channel
CN112054905B (en) Secure communication method and system of mobile terminal
CN120017376B (en) Mail encryption method based on quantum key distribution and related equipment
CN117749360B (en) Collaborative key management method, system, storage medium and electronic device
CN113365264A (en) Block chain wireless network data transmission method, device and system
CN107566119A (en) A kind of guard method of eSIM cards data safety and system
CN119109576A (en) A white box key processing method and terminal based on quantum key distribution
CN119814298A (en) Method and related device for encrypted communication of intercom
CN114765546B (en) End-to-end hard encryption method, system, encryption equipment and key management server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 230088 Anhui Province, Hefei City, Gaoxin District, Chengxiqiao Community Service Center, No. 900 Wangjiang West Road, Zhong'an Chuanggu Science and Technology Park Phase I, Building D8

Applicant after: Benyuan Quantum Computing Technology (Hefei) Co.,Ltd.

Address before: 230088 6th floor, E2 building, phase II, innovation industrial park, 2800 innovation Avenue, high tech Zone, Hefei City, Anhui Province

Applicant before: Benyuan Quantum Computing Technology (Hefei) Co.,Ltd.

Country or region before: China

CB02 Change of applicant information