[go: up one dir, main page]

JP2008245053A - Method and device for optical-communication quantum cryptographic communication - Google Patents

Method and device for optical-communication quantum cryptographic communication Download PDF

Info

Publication number
JP2008245053A
JP2008245053A JP2007084811A JP2007084811A JP2008245053A JP 2008245053 A JP2008245053 A JP 2008245053A JP 2007084811 A JP2007084811 A JP 2007084811A JP 2007084811 A JP2007084811 A JP 2007084811A JP 2008245053 A JP2008245053 A JP 2008245053A
Authority
JP
Japan
Prior art keywords
random number
running key
pseudo
binary
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2007084811A
Other languages
Japanese (ja)
Inventor
Yohei Kobayashi
洋平 小林
Katsuyoshi Harasawa
克嘉 原澤
Makoto Honda
真 本田
Shigeto Akutsu
重人 圷
Kenji Hosoi
健司 細井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Information and Telecommunication Engineering Ltd
Original Assignee
Hitachi Information and Communication Engineering Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Information and Communication Engineering Ltd filed Critical Hitachi Information and Communication Engineering Ltd
Priority to JP2007084811A priority Critical patent/JP2008245053A/en
Publication of JP2008245053A publication Critical patent/JP2008245053A/en
Pending legal-status Critical Current

Links

Images

Abstract

<P>PROBLEM TO BE SOLVED: To improve safety against an attacker by further complicating processing for common-key extraction. <P>SOLUTION: A plurality of m pseudo-random number generators having different primitive polynomials and different initial values are driven in parallel corresponding to a multi-valued number in order to obtain output; the output is set as one block; a pseudo-random number generator for changing a binary random number is used so as to execute the change of a binary random number in one block unit; and a binary optical-signal pair (a base) is selected, by using one block as a running key in order to set a multi-valued signal. Accordingly, the positions and the number of errors in a random-number sequence in one pseudo-random number generator, as seen from an eavesdropper are made random so as to further complicate the processings for common-key extraction by the eavesdropper. <P>COPYRIGHT: (C)2009,JPO&INPIT

Description

本発明は光通信量子暗号通信方法及びその装置に係り、特に暗号通信に用いられる共通鍵抽出のための処理の複雑化に関するものである。   The present invention relates to an optical communication quantum cryptography communication method and an apparatus therefor, and more particularly to complication of processing for extracting a common key used for encryption communication.

光通信量子暗号として、光の量子ゆらぎ(量子ショット雑音)を変調によって拡散させ、盗聴者が光信号を正確に受信できなくすることにより、無限の計算能力でも解読不能な共通鍵量子暗号が知られている。この共通鍵量子暗号は、2値の送信データを搬送する2値の光信号を1つのセット(基底という)とし、この基底をM個用意し、いずれの基底を使ってデータを送るかは暗号鍵に従う擬似乱数によって不規則に決める。これにより、現実的には光多値信号は量子ゆらぎによって識別ができないほど信号間距離が小さく設計されているため、結局、盗聴者は全く受信信号からデータ情報を読みとることができないというものである。   As an optical communication quantum cryptography, the common key quantum cryptography that cannot be decrypted even with infinite computational power is known by spreading the quantum fluctuation (quantum shot noise) of light by modulation and preventing an eavesdropper from receiving an optical signal accurately. It has been. In this common key quantum cryptography, a binary optical signal carrying binary transmission data is set as one set (referred to as a base), M bases are prepared, and which base is used to send data is a cipher. Randomly determined by pseudo-random numbers according to the key. As a result, the optical multilevel signal is designed so that the inter-signal distance is so small that it cannot be identified by quantum fluctuations, so that an eavesdropper cannot read the data information from the received signal at all. .

正規な送受信者の光変復調装置は、2値のM個の基底を共通の擬似乱数にしたがって切り換えて通信するため、正規な受信者は信号間距離の大きな2値の信号判定によってデータを読みとることができ、結局、量子ゆらぎによるエラーは無視でき、正確な通信が可能となる。   Since the optical modulator / demodulator of the authorized sender / receiver switches the binary M bases in accordance with the common pseudo-random number and communicates, the authorized receiver reads the data by binary signal judgment with a large inter-signal distance. In the end, errors due to quantum fluctuations can be ignored, and accurate communication is possible.

この原理に基づく暗号方式は、Yuen−2000暗号通信プロトコル(Y−00プロトコルと略称される)によるYuen量子暗号と呼ばれる。現在、このY−00プロトコルを具現化する通信方式としては、P.KumarやH.YuenらのNorthwestern大学が非特許文献1により光位相変調方式を発表している。また、玉川大学グループが非特許文献2により光強度変調方式を発表している。
尚、このY−00プロトコルは、光の量子ゆらぎを活用しない場合(古典Y−00と呼ぶ)、例として無線通信、電気的な通信にも、通常のストリーム暗号と比較して高い暗号強度が実現できるプロトコルである。
An encryption scheme based on this principle is called Yuen quantum cryptography according to Yuen-2000 cryptographic communication protocol (abbreviated as Y-00 protocol). Currently, as a communication method for realizing the Y-00 protocol, P.I. Kumar and H. Yuen et al., Northwestern University, published an optical phase modulation method according to Non-Patent Document 1. In addition, Tamagawa University Group has announced a light intensity modulation method according to Non-Patent Document 2.
Note that this Y-00 protocol does not utilize the quantum fluctuations of light (referred to as classical Y-00). For example, wireless communication and electrical communication have higher encryption strength than ordinary stream ciphers. It is a protocol that can be realized.

G.A.Barbosa, E.Corndorf, P.Kumar, H.P.Yuen, “Secure communication using mesoscopic coherent state,” Phys. Rev. Lett. vol−90, 227901, (2003)G. A. Barbosa, E .; Corndorf, P.M. Kumar, H.C. P. Yuen, “Secure communication using mesoscopic coherent state,” Phys. Rev. Lett. vol-90, 229011, (2003) O.Hirota, K.Kato, M.Sohma, T.Usuda, K.Harasawa, “Quantum stream cipher based on optical communication” SPIE Proc. on Quantum Communications and Quantum Imaging vol−5551, (2004)O. Hirota, K.K. Kato, M.M. Sohma, T .; Usuda, K .; Harasawa, “Quantum stream cipher based on optical communication” SPIE Proc. on Quantum Communications and Quantum Imaging vol-5551, (2004)

量子ゆらぎにより安全性が担保される光通信量子暗号Y−00では、量子ゆらぎを効果的に用いるために多値変調を行っている。多値変調を行う際、基底数をMとすると擬似乱数発生器の出力乱数系列をlog2Mビットごとのブロックに分け、そのブロックをRunning鍵(M通り)としてM個の基底の1つを選択する。 In the optical communication quantum cipher Y-00 whose security is ensured by quantum fluctuations, multi-level modulation is performed in order to effectively use quantum fluctuations. When performing multi-level modulation, if the base number is M, the output random number sequence of the pseudo random number generator is divided into blocks each of log 2 M bits, and one of the M bases is set as a running key (M types). select.

盗聴者が解読を行う場合、信号の測定値から測定値に対応したRunning鍵系列を得ようとするが、量子ゆらぎの効果により測定値へ原理的に避けられないエラーが発生する。従って盗聴者はエラーの混入したRunning鍵系列から正しい共通鍵の抽出を行わなければならい。このとき、出力乱数系列中のエラーの位置と個数を完全なランダムに近づけることで、盗聴者による共通鍵抽出のための処理を複雑化できる。   When an eavesdropper performs decryption, an attempt is made to obtain a Running key sequence corresponding to the measured value from the measured value of the signal. However, an error that cannot be avoided in principle occurs in the measured value due to the effect of quantum fluctuation. Therefore, an eavesdropper must extract a correct common key from a running key sequence in which an error is mixed. At this time, the process for extracting the common key by the eavesdropper can be complicated by making the position and number of errors in the output random number sequence close to complete randomness.

本発明の目的は、盗聴者による共通鍵抽出のための処理をより複雑化することにより、攻撃者に対する安全性を一層向上させることにある。   An object of the present invention is to further improve the security against an attacker by further complicating the process for extracting a common key by an eavesdropper.

本発明は、初期値と結線構造の異なる複数の擬似乱数発生器を並列に駆動し、その出力を1ブロックとして、ブロック単位で2値乱数系列の入替えを行うことで、擬似乱数発生器における出力乱数系列のエラーの位置と個数をランダムにし、共通鍵抽出のための処理を複雑化するものである。   The present invention drives a plurality of pseudo-random number generators having different initial values and connection structures in parallel, sets the output as one block, and replaces a binary random number sequence in units of blocks, thereby outputting an output in the pseudo-random number generator. This randomizes the position and number of errors in the random number sequence and complicates the process for extracting the common key.

本発明に係る通信方法は、好ましくは、送信側でRunning鍵を用いて送信データを多値変調して暗号化したデータを送信し、受信側で多値変調された暗号化データを同じRunning鍵を用いて復号化する光通信量子暗号通信方法において、
送信側では、初期値と結線構造の異なる複数mの擬似乱数発生器を並列駆動して得られる出力を1ブロックとして、ブロック単位で2値乱数系列の入替えを行って、擬似乱数発生器における出力乱数系列のエラーの位置と個数をランダムにして暗号化データを生成し、
受信側では、同様に初期値と結線構造の異なる複数の擬似乱数発生器を使用して、ブロック単位で2値乱数系列の入替えを行って、受信した暗号化データを2値検出して復号化する通信方法として構成される。
In the communication method according to the present invention, it is preferable that the transmission side uses the Running key to transmit data that has been multi-value modulated and encrypted, and the reception side uses the same Running Key In the optical communication quantum cryptography communication method for decrypting using
On the transmission side, the output obtained by parallel driving a plurality of m pseudo random number generators having different connection structures from the initial value is regarded as one block, and the binary random number sequence is replaced in units of blocks, and the output in the pseudo random number generator Generate random data with random position and number of random number errors,
On the receiving side, using a plurality of pseudo-random number generators with different initial values and connection structures, the binary random number sequence is replaced in units of blocks, and the received encrypted data is binary detected and decrypted. Configured as a communication method.

好ましい例では、送信側では、平文とRunning鍵の最上位ビット(MSB)で排他的論理和を行った後に平文の基底を選択し、基底の持つ0,1極性に合わせてRunning鍵のMSBを反転、又は非反転することで多値信号を選択し、受信側では2値検出後にRunning鍵の最上位ビットと排他的論理和を行う。
また、好ましくは、前記擬似乱数発生器として、LFSR(リニアフィードバックシフトレジスタ)を使用し、出力されるRunning鍵系列と同じ系列を出力する等価LFSRの線形複雑度が、Running鍵の周期と等しくなるように設定する。
また、好ましくは、出力されるRunning鍵系列と同じ系列を出力する等価LFSRの線形複雑度が、Running鍵の周期と等しくすることにより、盗聴者に対して複数mの各LFSRの構造推定を行わせる。
本発明はまた送信側における送信方法、及び受信側における受信方法としてもそれぞれ把握し得る。
In a preferred example, the sending side selects the plaintext base after performing an exclusive OR with the plaintext and the most significant bit (MSB) of the Running key, and sets the MSB of the Running key according to the 0 and 1 polarities of the base. A multilevel signal is selected by inversion or non-inversion, and the receiving side performs exclusive OR with the most significant bit of the Running key after binary detection.
Preferably, the pseudo-random number generator uses an LFSR (Linear Feedback Shift Register), and the linear complexity of the equivalent LFSR that outputs the same sequence as the output Running key sequence is equal to the cycle of the Running key. Set as follows.
Preferably, the structure of each LFSR of a plurality of m is performed on an eavesdropper by making the linear complexity of the equivalent LFSR that outputs the same sequence as the output running key sequence equal to the cycle of the running key. Make it.
The present invention can also be understood as a transmission method on the transmission side and a reception method on the reception side.

また、本発明に係る送信機は、好ましくは、Running鍵を用いて送信データを多値変調することにより暗号化した多値レベルの光信号を送信する送信機において、初期値Kと結線構造の異なる複数mの擬似乱数発生器と、複数mの擬似乱数発生器を並列駆動して得られる出力を1ブロックとして、ブロック単位で2値乱数系列の入替えを行って1つのRunning鍵を発生する入替器と、入替器による入替え位置を変更するために入替器に乱数を与える入替器用擬似乱数発生器と、入替器から出力されるRunning鍵の値に応じて、送信データをビット単位で多値変調して暗号化データを生成する多値強度変調器と、を有する送信機として構成される。   In addition, the transmitter according to the present invention is preferably a transmitter that transmits a multilevel optical signal encrypted by multilevel modulation of transmission data using a Running key. Replacement of different m pseudorandom number generators and the output obtained by driving plural m pseudorandom number generators in parallel as one block, by exchanging binary random number sequences in units of blocks and generating one Running key Multi-level modulation of the transmission data in bit units according to the value of the random number for the exchanging device, the pseudo random number generator for the exchanging device that gives the random number to the exchanging device in order to change the exchanging position by the exchanging device And a multi-value intensity modulator that generates encrypted data.

また、本発明に係る受信機は、好ましくは、Running鍵を用いて、受信した暗号データを2値化して復号化する送信機において、初期値Kと結線構造の異なる複数mの擬似乱数発生器と、複数mの擬似乱数発生器を並列駆動することにより生成される複数の乱数のブロックに関して、ブロック単位で2値乱数系列の入替えを行って1つのRunning鍵を発生する入替器と、入替器による入替え位置を変更するために入替器に乱数を与える入替器用擬似乱数発生器と、入替器から出力されるRunning鍵の値に応じて、暗号化データをビット単位で復号化したデータを生成する2値検出器と、を有する受信機として構成される。   Also, the receiver according to the present invention is preferably a transmitter for binarizing and decrypting received encrypted data using a Running key, and a plurality of m pseudorandom number generators having different connection structures from the initial value K A swapper that replaces a binary random number sequence in units of blocks and generates one Running key for a plurality of random number blocks generated by driving a plurality of m pseudorandom number generators in parallel; A pseudo-random number generator for a changer that gives a random number to the changer in order to change the replacement position by means of, and generates data obtained by decrypting the encrypted data in bit units according to the value of the Running key output from the changer And a receiver having a binary detector.

本発明によれば、光通信量子暗号Y−00における盗聴者の鍵の絞込み数が増大し、1台の擬似乱数発生器における乱数系列のエラーの位置と個数がランダムになるため、盗聴者による共通鍵抽出のための処理がより複雑化する。これにより、相関攻撃や高速相関攻撃が役に立たなくなり一層安全性が向上する。   According to the present invention, the number of narrowing down of the eavesdropper key in the optical communication quantum cryptography Y-00 is increased, and the position and number of random number sequence errors in one pseudo random number generator are randomized. The process for extracting the common key becomes more complicated. As a result, the correlation attack or the high-speed correlation attack becomes useless, and the safety is further improved.

以下、図面を参照して本発明の実施形態について説明する。
まず、盗聴者による共通鍵抽出処理の複雑化の原理について説明する。
光通信量子暗号では、信号測定時の量子ゆらぎによるエラーで、Running鍵の下位数ビット程度にエラーが生じる。この状態ではエラーの位置が特定されるために、相関攻撃、高速相関攻撃等に弱くなる。
そこでこれを改善するため、多値数に応じて原始多項式と初期値の異なるm台の擬似乱数発生器を用意する。このとき、m台の擬似乱数発生器全ての原始多項式を異なるものにしなければならない。その理由は、擬似乱数発生器の結線構造は原始多項式によって決定されており、原始多項式が等しいということは、擬似乱数発生器の結線構造も等しくなり、1台の擬似乱数発生器の構造が推定されたときに、他の擬似乱数発生器の結線構造も分かってしまうからである。また、初期値もある1台の擬似乱数発生器の初期値から他の擬似乱数発生器の初期値が推定されることを防ぐために、全て異なる初期値を用意する。それら複数の擬似乱数発生器を並列で駆動し、得られる出力を1ブロックとして、ブロック単位で2値乱数入替え用の擬似乱数発生器を用いて2値乱数の入替えを毎回行った後、そのブロックをRunning鍵として基底を選択し、多値の信号を選択する。
Hereinafter, embodiments of the present invention will be described with reference to the drawings.
First, the principle of complicating common key extraction processing by an eavesdropper will be described.
In optical communication quantum cryptography, an error occurs due to quantum fluctuations at the time of signal measurement, and an error occurs in the lower few bits of the Running key. In this state, since the position of the error is specified, it becomes weak against a correlation attack, a fast correlation attack, and the like.
Therefore, in order to improve this, m pseudo-random number generators having different initial values from the primitive polynomial are prepared according to the multi-value number. At this time, the primitive polynomials of all m pseudorandom number generators must be different. The reason is that the connection structure of the pseudo random number generator is determined by the primitive polynomial, and that the primitive polynomial is equal, the connection structure of the pseudo random number generator is also equal, and the structure of one pseudo random number generator is estimated. This is because the connection structure of other pseudo-random number generators is also known. Also, in order to prevent the initial values of other pseudorandom number generators from being estimated from the initial values of one pseudorandom number generator that also has initial values, all different initial values are prepared. These multiple pseudo-random number generators are driven in parallel, and the resulting output is set as one block, and binary random number replacement is performed every time using a pseudo-random number generator for binary random number replacement in units of blocks. Is selected as a running key, and a multi-value signal is selected.

盗聴者が解読を行おうとすると、信号測定時に量子ゆらぎによって、Running鍵の下位数ビット程度によるエラーが発生する。量子ゆらぎによるエラーは相関が無く、個数がランダムになる。(確率的に有意性を持っている)光通信量子暗号ではデフォルト設定でエラーの個数がRunning鍵の下位0〜3ビット程度になるように光多値信号の信号間距離が設計されている。   If an eavesdropper attempts to decode, an error due to the lower few bits of the Running key occurs due to quantum fluctuations during signal measurement. Errors due to quantum fluctuations have no correlation and the number is random. In optical communication quantum cryptography (having probabilistic significance), the inter-signal distance of the optical multilevel signal is designed so that the number of errors is about the lower 0 to 3 bits of the Running key by default.

以上より、Running鍵におけるエラーの位置は殆んど固定されているが、ブロック単位で2値乱数の入替えを毎回行うことにより、1ブロックを構成しているm台全ての擬似乱数発生器がエラーを経験することになり、1台の擬似乱数発生器における出力乱数系列のエラーの位置と個数がランダムになる。   From the above, although the error position in the Running key is almost fixed, by performing binary random number replacement every block, all the pseudo random number generators composing one block are in error. The position and number of errors in the output random number sequence in one pseudo-random number generator will be random.

上記の方法により盗聴者から見た1台の擬似乱数発生器における出力乱数系列のエラーの位置と個数がランダムになることが理解される。しかし、原始多項式と初期値の異なるm台の擬似乱数発生器を並列で駆動し、2値乱数の入替えを行った後のRunning鍵系列と全く同じ系列を出力する等価擬似乱数発生器が存在する場合、盗聴者はRunning鍵系列から等価擬似乱数発生器の構造推定を行おうとする可能性がある。この場合、盗聴者の共通鍵抽出のための処理は複雑化されない。   By the above method, it is understood that the position and number of errors in the output random number sequence in one pseudorandom number generator viewed from the eavesdropper are random. However, there are equivalent pseudo-random number generators that drive m pseudo-random number generators having different initial values from the primitive polynomial in parallel and output exactly the same sequence as the Running key sequence after the binary random number is replaced. In this case, the eavesdropper may try to estimate the structure of the equivalent pseudorandom number generator from the Running key sequence. In this case, the process for extracting the common key of the eavesdropper is not complicated.

そこで、盗聴者にRunning鍵系列を出力する等価擬似乱数発生器を作らせないため、さらに暗号用乱数として以下のような工夫が必要になる。
まず、Running鍵は多値強度変調の際の基底選択を行うため、最終的に暗号化を行う鍵となる。よってm通りののRunning鍵は全て偏りなく1/mの確率で生成されるようにしなければならない。
次に、Running鍵系列と同じ系列を出力する等価擬似乱数発生器の線形複雑度をRunning鍵系列の周期と等しくなるように設定する。このとき、盗聴者はm台の各擬似乱数発生器の構造推定をそれぞれ行わなければならない。線形複雑度とは、ある系列が与えられた場合、それを生成する最小の擬似乱数発生器の段数を示す。与えられた系列を生成する擬似乱数発生器は必ず存在する。極端な場合、与えられた系列と同じ長さを持つシフトレジスタを用意し、初期値として与えられた系列をそのままセットすればよい。線形複雑度の計算には一般的にBerlekamp-Massy法が用いられる。このアルゴリズムは与えられた乱数系列から逐次的に線形複雑度と最小生成擬似乱数発生器の構成するアルゴリズムである。1ビットごとに計算を行うとそれまでの系列を出力する原始多項式と線形複雑度が逐次的に得られる。そして与えられた乱数系列の線形複雑度以上計算を続けると原始多項式が変化しなくなり、このときの原始多項式が正しいものとなる。これにより正しい線形複雑度と結線構造が分かるので、等価擬似乱数発生器が求められる。
Therefore, in order to prevent an eavesdropper from creating an equivalent pseudorandom number generator that outputs a running key sequence, the following contrivances are required as cryptographic random numbers.
First, the Running key is the key for the final encryption because it performs base selection at the time of multilevel intensity modulation. Therefore, all m running keys must be generated with a probability of 1 / m without any bias.
Next, the linear complexity of the equivalent pseudo-random number generator that outputs the same sequence as the Running key sequence is set to be equal to the cycle of the Running key sequence. At this time, the eavesdropper must perform structure estimation of each of the m pseudorandom number generators. The linear complexity indicates the number of stages of the smallest pseudo-random number generator that generates a given sequence. There is always a pseudo-random number generator that generates a given sequence. In an extreme case, a shift register having the same length as the given sequence is prepared, and the sequence given as the initial value may be set as it is. The Berlekamp-Massy method is generally used for calculating the linear complexity. This algorithm is composed of a linear complexity and a minimum generation pseudo-random number generator sequentially from a given random number sequence. When calculation is performed for each bit, a primitive polynomial and linear complexity for outputting the sequence up to that point can be obtained sequentially. If the calculation is continued beyond the linear complexity of the given random number sequence, the primitive polynomial does not change, and the primitive polynomial at this time becomes correct. As a result, the correct linear complexity and connection structure are known, and an equivalent pseudorandom number generator is obtained.

Berlekamp-Massy法はどのような系列にも適用できるが、等価擬似乱数発生器の線形複雑度がRunning鍵系列の周期と等しくなるように設計されていれば、原始多項式が常に変化し続けて一意に決まらないので、等価擬似乱数発生器を求められずにRunning鍵系列の全ての周期が終わってしまう。よって、盗聴者は出力乱数系列の一部から残りの系列を予測することができず、m台それぞれの擬似乱数発生器の構造推定を行う必要がある。   The Berlekamp-Massy method can be applied to any sequence, but if the linear complexity of the equivalent pseudorandom number generator is designed to be equal to the period of the Running key sequence, the primitive polynomial will always change and be unique. Therefore, all the periods of the Running key sequence are terminated without obtaining an equivalent pseudorandom number generator. Therefore, the eavesdropper cannot predict the remaining series from a part of the output random number series, and needs to estimate the structure of each of the m pseudorandom number generators.

盗聴者がm個の各擬似乱数発生器の構造推定を行わなければならないとき、その安全性指数は以下のようになる。
通常擬似乱数発生器のレジスタ数(線形複雑度)をnとすると、連続した正確な2nビットがあれば全ての系列を生成できる。これは、2nビットの連続する出力から結線構造に関するn元連立方程式が得られるからである。よって盗聴者は1台の擬似乱数発生器の出力乱数系列分の2nビットの信号を測定する。
When an eavesdropper has to make structure estimates for each of the m pseudorandom number generators, the safety index is as follows:
In general, assuming that the number of registers (linear complexity) of the pseudorandom number generator is n, all sequences can be generated if there are continuous 2n bits. This is because an n-ary simultaneous equation relating to the connection structure can be obtained from 2n-bit continuous output. Therefore, an eavesdropper measures a 2n-bit signal corresponding to the output random number sequence of one pseudo-random number generator.

次に、盗聴者は信号測定時に発生するエラーを考慮して真の鍵の可能数を絞り込む。そして絞り込まれた鍵の中から真の鍵を見つけ出すために既知平文攻撃を行う。この絞り込みの数はY−00における安全性指数Qとして既に評価されている。
基本モデルY−00の安全性指数は
Next, the eavesdropper narrows down the possible number of true keys in consideration of errors that occur during signal measurement. Then, a known plaintext attack is performed to find the true key from the narrowed down keys. This number of refinements has already been evaluated as the safety index Q at Y-00.
The safety index of the basic model Y-00 is

Figure 2008245053
Figure 2008245053

である。
ここで、n:レジスタ数、M:基底数、J:量子ゆらぎによる識別不可能信号数である。

Figure 2008245053
It is.
Here, n is the number of registers, M is the number of bases, and J is the number of indistinguishable signals due to quantum fluctuations.
Figure 2008245053

Figure 2008245053
Figure 2008245053

となる。mは用意する擬似乱数発生器の台数であり、多値数に応じて変わる値で、基定数Mを使って記述すると、 It becomes. m is the number of pseudo-random number generators to be prepared, and is a value that changes according to the multi-value number.

Figure 2008245053
Figure 2008245053

台である。 It is a stand.

式(1)、(2)より明らかに、   From equations (1) and (2),

Figure 2008245053
Figure 2008245053

となるので安全性が大きく向上することがわかる。 Therefore, it can be seen that the safety is greatly improved.

ここで図2及び図3を参照して、エラーの個数とその分散範囲について説明する。
図2は各ブロック鍵(Running鍵)K1 R〜鍵K5 Rに関連したエラーの個数及びその範囲を示している。図2のエラーと書かれた範囲にエラーが生じていることを示す。図3は各擬似乱数発生器によるエラーの位置(△印)と個数の関係を示す。
例えば、Running鍵K1 RではK(1)とK(6) とK(m)がエラーであり、それは図3を参照すると、擬似乱数発生器112と116と11mの3ヶ所にエラーがあることに対応する。また、他の例として、Running鍵K3 RではK(1)とK(3)の2つがエラーであり、それは図5を参照すると、擬似乱数発生器111、113の2ヶ所にエラーがあることに対応する。
このように、ブロック単位(Running鍵単位)で発生するエラーを1台の擬似乱数発生器におけるエラーとしてまとめると、出力乱数系列のエラーの位置と個数がランダムになることが理解できる。
Here, the number of errors and their dispersion range will be described with reference to FIGS.
FIG. 2 shows the number and range of errors associated with each block key (Running key) K 1 R to K 5 R. It shows that an error has occurred in the range written as error in FIG. FIG. 3 shows the relationship between the number of errors (Δ mark) and the number of errors by each pseudo-random number generator.
For example, in the running key K 1 R , K (1) , K (6), and K (m) are errors, and referring to FIG. 3, there are errors in three places of the pseudo random number generators 112, 116, and 11m. Corresponding to that. As another example, in the running key K 3 R , two errors K (1) and K (3) are errors, and referring to FIG. 5, there are errors in two places of the pseudo random number generators 111 and 113. Corresponding to that.
As described above, when errors that occur in units of blocks (units of running keys) are collected as errors in one pseudo-random number generator, it can be understood that the position and number of errors in the output random number sequence are random.

次に、図1を参照して、光通信量子暗号通信の具体例について説明する。
図1において、光通信量子暗号Y−00による通信システムは、送信機1と受信機2が光ファイバー等の通信路3を介して接続して構成される。
送信機1は、初期暗号鍵|k|の入力により擬似乱数系列を生成してRunning鍵を発生する複数m台の擬似乱数発生器111,112、11m−1、11mと、並列に駆動される擬似乱数発生器111,112、11m−1、11mから生成されたm個の乱数を1ブロックとして、ブロック単位で位置の入れ替えて最終的にRunning鍵KRを出力する2値乱数入替器12と、2値乱数入替器12における入替えのビット位置を決めるための擬似乱数を発生する擬似乱数発生器13と、1または0からなる送信データ(平文)Xiを1ビットずつ、Running鍵KRのMSB(最上位ビット)で排他的論理和を取る(即ち平文のビットの極性をRunning鍵KRによって反転する)XOR(Tx)15と、XOR(Tx)15で反転処理された送信データXi‘をRunning鍵KRの値に応じた基底と、基底の持つ0、1極性により、Running鍵KRのMSBを反転又は非反転させることで、平文をビット単位で多値変調して、多値レベルのアナログ信号(暗号文Ci)を生成する多値強度変調器14を備えて構成される。
Next, a specific example of optical communication quantum cryptography communication will be described with reference to FIG.
In FIG. 1, the communication system based on the optical communication quantum cryptography Y-00 is configured by connecting a transmitter 1 and a receiver 2 via a communication path 3 such as an optical fiber.
The transmitter 1 is driven in parallel with a plurality of m pseudo-random number generators 111, 112, 11m-1, and 11m that generate a running key by generating a pseudo-random number sequence by inputting an initial encryption key | k |. of m random number generated from the pseudo-random number generator 111,112,11m-1,11m as one block, a binary random number replacement 12 for outputting a final Running key K R interchanged positions in blocks , a pseudo random number generator 13 for generating a pseudo-random number for determining the bit position of the replacement in the binary random number replacement unit 12, transmission data (plain text) bit by bit Xi of one or 0, Running key K R of MSB in (MSB) XORing (i.e. the polarity of bit plain text reversed by Running key K R) and XOR (Tx) 15, inverting processing of at XOR (Tx) 15 And the base of the transmission data Xi 'corresponding to the value of the Running key K R was, by 0,1 polarity having a base, by inverting or non-inverting the MSB of the Running key K R, multilevel modulation plaintext bit by bit The multi-level intensity modulator 14 that generates a multi-level analog signal (ciphertext C i ) is provided.

ここで、複数の擬似乱数発生器111〜11m、13には、例えば、デフォルト設定でリニアフィードバックシフトレジスタ(Linear Feedback Shift Register(LFSR))が用いられ、かつそれらの擬似乱数発生器は、初期値と結線構造が全て異なる。同様に、後述する複数m台の擬似乱数発生器211〜21m、23もLFSRが用いられ、それらの初期値と結線構造は全て異なる。ここで、送信側と受信側は同じRunning鍵KRを用いて暗号通信するので、擬似乱数発生器111〜11mと擬似乱数発生器211〜21mは初期値と結線構造が同じである。
また、図中、|K1|〜|Km|は擬似乱数発生器111,112、11mの初期鍵、K(1)〜K(m)は擬似乱数発生器111,112、11mの出力、KRはRunning鍵を示す。
Here, for example, a linear feedback shift register (Linear Feedback Shift Register (LFSR)) is used for the plurality of pseudo random number generators 111 to 11m and 13 by default, and these pseudo random number generators have initial values. The connection structure is all different. Similarly, a plurality of m pseudo-random number generators 211 to 21m and 23 to be described later use LFSR, and their initial values and connection structures are all different. Here, the sender and the receiver is because the encryption communication by using the same Running key K R, the pseudo-random number generator 111~11m pseudorandom number generator 211~21m is the initial value and the connection structure is the same.
In the figure, | K 1 | to | K m | are initial keys of the pseudo random number generators 111, 112, and 11m, and K (1) to K (m) are outputs of the pseudo random number generators 111, 112, and 11m, K R indicates a Running key.

受信機2は、初期暗号|k|の入力により擬似乱数系列を生成してRunning鍵を発生する複数m台の擬似乱数発生器211,212、21m-1、21mと、並列に駆動される擬似乱数発生器211,212、21m−1、21mから生成されたm個の乱数を1ブロックとして、ブロック単位で位置の入れ替えて、最終的にRunning鍵KRを出力する2値乱数入替器22と、2値乱数入替器22における入替えのビット位置を決めるための擬似乱数を発生する擬似乱数発生器23と、通信路3を介して受信した送信データ(Ci)に対して2値乱数入替器22から出力されるRunning鍵KRからMSB(最上位ビット)を取り除いたブロックをしきい値として、送信側の基底と同じ0,1極性で、0と1との判定(弁別)を行って2値から成る受信データを出力する2値検出器24と、2値の受信データを1ビットずつ、Running鍵KRのMSBで排他的論理和を取り、平文を出力するXOR(Rx)25と、を備えて構成される。 The receiver 2 receives a plurality of m pseudorandom number generators 211, 212, 21m-1, 21m that generate a running key by generating a pseudorandom number sequence by inputting an initial cipher | k | A binary random number changer 22 that replaces the position of each block in units of m random numbers generated from the random number generators 211, 212, 21m-1, and 21m and finally outputs the Running key K R. A pseudo random number generator 23 for generating a pseudo random number for determining a bit position for replacement in the binary random number replacer 22, and a binary random number replacer for transmission data (C i ) received via the communication path 3. block as a threshold to which the Running key K R to be output by removing the MSB (most significant bit) from 22, with the same 0,1 polarity as the base of the transmitting side, performing determination (discrimination) between 0 and 1 A binary detector 24 for outputting reception data of two values, one bit data received binary exclusive-ORed with the MSB of Running key K R, and XOR (Rx) 25 for outputting the plaintext , And is configured.

このような構成のシステムにおいて、送信機1では、送信データXiは、複数の擬似乱数発生器111,112、11m−1、11mを並列に駆動して生成し得られた1つのRunning鍵KRの値に従って多値強度変調器14で多値光信号に変調して、通信路3へ送出される。受信機2では、複数の擬似乱数発生器211,212,21mを並列に駆動して生成し得られた1つのRunning鍵KRに基づいて受信データ(暗号文Ci)を復号化して平文Xiを出力する。 In the system having such a configuration, in the transmitter 1, the transmission data Xi is generated by driving the plurality of pseudo-random number generators 111, 112, 11m-1, and 11m in parallel to generate one Running key K R. Is modulated into a multilevel optical signal by the multilevel intensity modulator 14 and sent to the communication path 3. The receiver 2 decrypts the received data (ciphertext C i ) based on one running key K R generated by driving a plurality of pseudo-random number generators 211, 212, 21 m in parallel to obtain plaintext Xi. Is output.

なお、本発明は上記の実施例に限定されることなく、種々変形して実施し得る。
例えば、図1に示した、XOR15及び25は必ずしも必要としない。これらのXORが無くても、光通信量子暗号通信を実現することができる。
また、図1に示した送信機1又は受信機2の各機能は、ハードウェアとして回路で構成してもよいし、或いはその少なくとも一部をソフトウェアで実現してもよい。ソフトウェアで実現する場合、送信機1又は受信機2はCPUを有し、所定の機能を実現するプログラムを実行することなる。
In addition, this invention is not limited to said Example, A various deformation | transformation can be implemented.
For example, the XORs 15 and 25 shown in FIG. 1 are not necessarily required. Even without these XORs, optical communication quantum cryptography communication can be realized.
Further, each function of the transmitter 1 or the receiver 2 shown in FIG. 1 may be configured as a circuit as hardware, or at least a part thereof may be realized by software. When realized by software, the transmitter 1 or the receiver 2 has a CPU, and executes a program for realizing a predetermined function.

本発明の一実施形態における光通信量子暗号Y−00を採用した通信システムの構成を示す図。The figure which shows the structure of the communication system which employ | adopted optical communication quantum cryptography Y-00 in one Embodiment of this invention. 一実施形態における盗聴者から見る、Running鍵系列へのエラー混入の様子を示す図。The figure which shows the mode of the error mixing in the Running key series seen from an eavesdropper in one Embodiment. 一実施形態における盗聴者から見る、各擬似乱数発生器に対するエラーの位置と個数の関係。The relationship between the position and number of errors for each pseudorandom number generator as seen by an eavesdropper in one embodiment.

符号の説明Explanation of symbols

1:送信機、 111、112、11m−1、11m、13:擬似乱数発生器、 12:2値乱数入替器、 14:多値強度変調器、 15:XOR、
2:受信機、 211、212、21m−1、21m、23:擬似乱数発生器、
22:2値乱数入替器、 24:2値検出器、 25:XOR、 3:通信路、
Xi:平文、 Xi‘:平文とRunning鍵のMSBでXORを取った結果、
i:暗号文、 |K1|〜|Km|:各擬似乱数発生器の初期鍵、 KR:Running鍵、 K(1)〜K(m):擬似乱数発生器出力、
1: transmitter, 111, 112, 11m-1, 11m, 13: pseudo-random number generator, 12: binary random number changer, 14: multi-value intensity modulator, 15: XOR,
2: Receiver 211, 212, 21m-1, 21m, 23: Pseudo random number generator,
22: binary random number changer, 24: binary detector, 25: XOR, 3: communication channel,
Xi: plaintext, Xi ': the result of XOR with plaintext and MSB of running key,
C i : Ciphertext, | K 1 | to | K m |: Initial key of each pseudo random number generator, K R : Running key, K (1) to K (m) : Pseudo random number generator output,

Claims (12)

送信側でRunning鍵を用いて送信データを多値変調して暗号化したデータを送信し、受信側で該多値変調された暗号化データを同じRunning鍵を用いて復号化する光通信量子暗号通信方法において、
送信側では、初期値と結線構造の異なる複数の擬似乱数発生器を並列に駆動して得られる出力を1ブロックとして、1ブロック単位で2値乱数系列の入替えを行ったものをRunning鍵として多値変調して、該擬似乱数発生器における出力乱数系列のエラーの位置と個数をランダムにし、
受信側では、同様に初期値と結線構造の異なる複数の擬似乱数発生器を並列に駆動して得られる出力を1ブロックとして、1ブロック単位で2値乱数系列の入替えを行ったものをRunning鍵として、2値検出を行い復号化することを特徴とする通信方法。
An optical communication quantum cipher that transmits data obtained by multi-level modulation of transmission data using a running key on the transmission side and decrypts the multi-value modulated encrypted data on the reception side using the same running key In the communication method,
On the transmission side, the output obtained by driving a plurality of pseudo-random number generators having different initial values and connection structures in parallel is regarded as one block, and a binary random number sequence per unit is replaced as a running key. Modulating value, randomizing the position and number of errors in the output random number sequence in the pseudo-random number generator,
Similarly, on the receiving side, the output obtained by driving a plurality of pseudo-random number generators having different initial values and different connection structures in parallel is regarded as one block, and a random number sequence obtained by exchanging binary random number sequences in units of one block. A communication method characterized by performing binary detection and decoding.
送信側では、Running鍵の最下位ビット(LSB)が1のとき基底の上を1、下を0とし、かつRunning鍵のLSBが0のとき基底の上を0、下を1とし、又はRunning鍵のLSBが1のとき基底の上を0、下を1とし、かつRunning鍵のLSBが0のとき基底の上を1、下を0として、基底の持つ0、1の極性を決定し、
受信側では、同様にRunning鍵の最下位ビット(LSB)が1のとき基底の上を1、下を0とし、かつRunning鍵のLSBが0のとき基底の上を0、下を1とし、又はRunning鍵のLSBが1のとき基底の上を0、下を1とし、かつRunning鍵のLSBが0のとき基底の上を1、下を0として、基底の持つ0、1の極性を決定することを特徴とする請求項1の通信方法。
On the transmitting side, when the least significant bit (LSB) of the Running key is 1, the upper part of the base is 1 and the lower part is 0, and when the LSB of the Running key is 0, the upper part of the base is 0, and the lower part is 1. When the LSB of the key is 1, the top of the base is 0, the bottom is 1, and when the LSB of the Running key is 0, the top of the base is 1 and the bottom is 0.
Similarly, on the receiving side, when the least significant bit (LSB) of the Running key is 1, the upper part of the base is 1 and the lower part is 0. When the LSB of the Running key is 0, the upper part of the base is 0, and the lower part is 1. Or when the LSB of the Running key is 1, the top of the base is 0, and the bottom is 1, and when the LSB of the Running key is 0, the top of the base is 1 and the bottom is 0. 2. The communication method according to claim 1, wherein:
送信側では、平文とRunning鍵の最上位ビット(MSB)で排他的論理和を行った後に平文の基底を選択し、基底の持つ0、1の極性に合わせて多値信号を決定し、受信側ではRunning鍵の最上位ビット(MSB)を取り除いたブロックをしきい値として、送信側と同じ基底の0、1の極性により2値検出し、2値検出後にRunning鍵の最上位ビット(MSB)と排他的論理和を行うことを特徴とする請求項1の通信方法。   On the sending side, after performing an exclusive OR with the plaintext and the most significant bit (MSB) of the Running key, the plaintext base is selected, the multilevel signal is determined according to the 0 and 1 polarities of the base, and the reception is received. The binary side is detected by the polarity of 0 and 1 of the same base as that of the transmission side with the block from which the most significant bit (MSB) of the Running key is removed as a threshold on the side, and the most significant bit (MSB) of the Running key after the binary detection. 2. The communication method according to claim 1, wherein an exclusive OR is performed on the same. 前記擬似乱数発生器として、LFSR(リニアフィードバックシフトレジスタ)を使用し、出力されるRunning鍵系列と同じ系列を出力する等価LFSRの線形複雑度が、Running鍵の周期と等しくなるように設定することを特徴とする請求項1又は2又は3の通信方法。 An LFSR (linear feedback shift register) is used as the pseudo-random number generator, and the linear complexity of the equivalent LFSR that outputs the same sequence as the output running key sequence is set to be equal to the cycle of the running key. The communication method according to claim 1, 2, or 3. 出力されるRunning鍵系列と同じ系列を出力する等価LFSRの線形複雑度を、Running鍵の周期と等しくすることにより、複数mの各LFSRの構造推定を行うことを特徴とする請求項4の通信方法。   5. The communication according to claim 4, wherein the structure estimation of each of a plurality of m LFSRs is performed by making the linear complexity of an equivalent LFSR that outputs the same sequence as the output Running key sequence equal to the cycle of the Running key. Method. Running鍵を用いて送信データを多値変調することにより暗号化した多値レベルの光信号を送信する送信機において、
複数m種類の初期値Kと結線構造の異なる複数mの擬似乱数発生器と、複数mの擬似乱数発生器を並列に駆動することにより生成される乱数のブロックに関して、ブロック単位で2値乱数系列の入替えを行って、1つのRunning鍵を発生する入替器と、該入替器による入替え位置を変更するために、該入替器に乱数を与える入替器用擬似乱数発生器と、該入替器から出力されるRunning鍵の値に応じて、送信データをビット単位で多値変調して暗号化データを生成する多値変調器と、を有することを特徴とする送信機。
In a transmitter for transmitting a multilevel optical signal encrypted by multilevel modulation of transmission data using a running key,
A binary random number sequence in units of blocks regarding a plurality of m pseudo random number generators having different connection structures with m types of initial values K and random number blocks generated by driving the plurality of m pseudo random number generators in parallel. A changer that generates one Running key, and a changer for changing the change position by the changer, a changer pseudo-random number generator that gives a random number to the changer, and an output from the changer And a multi-level modulator that generates encrypted data by performing multi-level modulation of transmission data in units of bits according to a value of a running key.
送信機は、送信データとなる平文と、該入替器から出力される該Running鍵の最上位ビット(MSB)で排他的論理和をとる排他的論理和手段を有し、排他的論理和をとった平文と、該Running鍵により選択された平文の基底が持つ、Running鍵の最下位ビット(LSB)で決定される0、1の極性に合わせてRunning鍵のMSBを反転、又は非反転することで多値信号を決定し、多値変調すること特徴とする請求項6の送信機。 The transmitter has an exclusive OR means for taking an exclusive OR with the plaintext as transmission data and the most significant bit (MSB) of the Running key output from the exchanger. Invert or non-invert the MSB of the running key according to the polarity of 0 or 1 determined by the least significant bit (LSB) of the running key possessed by the plaintext and the plaintext base selected by the running key 7. The transmitter according to claim 6, wherein a multi-level signal is determined by multi-level modulation. Running鍵を用いて、受信した暗号データを2値検出して復号化する受信機において、
複数m種類の初期値Kと結線構造の異なる複数mの擬似乱数発生器と、複数mの擬似乱数発生器を並列に駆動することにより生成される乱数のブロックに関して、ブロック単位で2値乱数系列の入替えを行って、1つのRunning鍵を発生する入替器と、該入替器による入替え位置を変更するために、該入替器に乱数を与える入替器用擬似乱数発生器と、該入替器から出力されるRunning鍵の最上位ビット(MSB)を取り除いたブロックをしきい値として、該暗号化データをビット単位で復号化したデータを生成する2値検出器と、を有することを特徴とする受信機。
In the receiver that detects and decrypts the received encrypted data in binary using the Running key,
A binary random number sequence in units of blocks regarding a plurality of m pseudo random number generators having different connection structures with m types of initial values K and random number blocks generated by driving the plurality of m pseudo random number generators in parallel. A changer that generates one Running key, and a changer for changing the change position by the changer, a changer pseudo-random number generator that gives a random number to the changer, and an output from the changer And a binary detector for generating data obtained by decrypting the encrypted data in bit units, with a block obtained by removing the most significant bit (MSB) of the running key as a threshold value .
該2値検出器から出力されるデータを、該入替器からのRunning鍵のMSBと排他的論理和をとる排他的論理和手段を有する特徴とする請求項8の受信機。 9. The receiver according to claim 8, further comprising an exclusive OR means for performing an exclusive OR operation on the data output from the binary detector and the MSB of the Running key from the exchange. 前記擬似乱数発生器として、LFSR(リニアフィードバックシフトレジスタ)を使用し、出力されるRunning鍵系列と同じ系列を出力する等価LFSRの線形複雑度が、Running鍵の周期と等しくなるように設定する請求項6乃至8のいずれかの送信機又は受信機。 An LFSR (linear feedback shift register) is used as the pseudo-random number generator, and the linear complexity of an equivalent LFSR that outputs the same sequence as the output running key sequence is set to be equal to the cycle of the running key. Item 9. The transmitter or receiver according to any one of Items 6 to 8. Running鍵を用いて送信データを多値変調して暗号化したデータを送信する光通信量子暗号送信方法において、
初期値と結線構造の異なる複数の擬似乱数発生器を使用して、ブロック単位で2値乱数系列の入替えを行い、該擬似乱数発生器における出力乱数系列のエラーの位置と個数をランダムにして、該暗号化データを作成することを特徴とする送信方法。
In an optical communication quantum cryptography transmission method for transmitting data encrypted by multilevel modulation of transmission data using a Running key,
Using a plurality of pseudo-random number generators having different initial values and connection structures, the binary random number sequence is replaced in units of blocks, and the position and number of errors in the output random number sequence in the pseudo-random number generator are randomized, A transmission method comprising generating the encrypted data.
変調された暗号化データを同じRunning鍵を用いて復号化する光通信量子暗号受信方法において、
初期値と結線構造の異なる複数の擬似乱数発生器を使用して、ブロック単位で2値乱数系列の入替えを行い、該擬似乱数発生器における出力乱数系列のエラーの位置と個数をランダムにされた該暗号化データから2値データを復号化することを特徴とする受信方法。
In an optical communication quantum cryptography receiving method for decrypting modulated encrypted data using the same Running key,
Using a plurality of pseudo random number generators with different initial values and connection structures, the binary random number sequence was replaced in units of blocks, and the error random number position and number of random numbers in the pseudo random number generator were randomized. A receiving method comprising: decrypting binary data from the encrypted data.
JP2007084811A 2007-03-28 2007-03-28 Method and device for optical-communication quantum cryptographic communication Pending JP2008245053A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2007084811A JP2008245053A (en) 2007-03-28 2007-03-28 Method and device for optical-communication quantum cryptographic communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2007084811A JP2008245053A (en) 2007-03-28 2007-03-28 Method and device for optical-communication quantum cryptographic communication

Publications (1)

Publication Number Publication Date
JP2008245053A true JP2008245053A (en) 2008-10-09

Family

ID=39915808

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2007084811A Pending JP2008245053A (en) 2007-03-28 2007-03-28 Method and device for optical-communication quantum cryptographic communication

Country Status (1)

Country Link
JP (1) JP2008245053A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008206127A (en) * 2006-08-30 2008-09-04 Matsushita Electric Ind Co Ltd Data communication apparatus and data communication method
WO2010103628A1 (en) * 2009-03-11 2010-09-16 株式会社日立製作所 Encryption communication system
JP2012080229A (en) * 2010-09-30 2012-04-19 Hitachi Information & Communication Engineering Ltd Receiver, reception control method, and communication system
JPWO2010103677A1 (en) * 2009-03-11 2012-09-10 株式会社日立製作所 Cryptographic communication system
WO2019069403A1 (en) * 2017-10-04 2019-04-11 日本電気株式会社 Random number generation system, random number generation method, and random number generation program
CN120785643A (en) * 2025-08-20 2025-10-14 安徽国信通科技有限公司 Mobile phone encryption communication method integrating optical quantum random number generator

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10240500A (en) * 1997-02-28 1998-09-11 Toshiba Corp Random number generation device and method, encryption device and method, decryption device and method, and stream encryption system
JP2005038229A (en) * 2003-07-16 2005-02-10 Fujitsu Ltd Random number generator
JP2006295338A (en) * 2005-04-06 2006-10-26 Matsushita Electric Ind Co Ltd Data transmission device, data reception device, and data communication device
JP2006333138A (en) * 2005-05-26 2006-12-07 Matsushita Electric Ind Co Ltd Data transmission device, data reception device, and data communication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10240500A (en) * 1997-02-28 1998-09-11 Toshiba Corp Random number generation device and method, encryption device and method, decryption device and method, and stream encryption system
JP2005038229A (en) * 2003-07-16 2005-02-10 Fujitsu Ltd Random number generator
JP2006295338A (en) * 2005-04-06 2006-10-26 Matsushita Electric Ind Co Ltd Data transmission device, data reception device, and data communication device
JP2006333138A (en) * 2005-05-26 2006-12-07 Matsushita Electric Ind Co Ltd Data transmission device, data reception device, and data communication device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008206127A (en) * 2006-08-30 2008-09-04 Matsushita Electric Ind Co Ltd Data communication apparatus and data communication method
WO2010103628A1 (en) * 2009-03-11 2010-09-16 株式会社日立製作所 Encryption communication system
WO2010103677A1 (en) * 2009-03-11 2010-09-16 株式会社日立製作所 Encryption communication system
JPWO2010103677A1 (en) * 2009-03-11 2012-09-10 株式会社日立製作所 Cryptographic communication system
US8582770B2 (en) 2009-03-11 2013-11-12 Hitachi, Ltd. Cryptographic communication system
JP2012080229A (en) * 2010-09-30 2012-04-19 Hitachi Information & Communication Engineering Ltd Receiver, reception control method, and communication system
WO2019069403A1 (en) * 2017-10-04 2019-04-11 日本電気株式会社 Random number generation system, random number generation method, and random number generation program
JPWO2019069403A1 (en) * 2017-10-04 2020-11-26 日本電気株式会社 Random number generation system, random number generation method and random number generation program
CN120785643A (en) * 2025-08-20 2025-10-14 安徽国信通科技有限公司 Mobile phone encryption communication method integrating optical quantum random number generator

Similar Documents

Publication Publication Date Title
Hirota Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol
US8284937B2 (en) Method for synchronization in encrypted communications using shared key
Yuen Key generation: Foundations and a new quantum approach
CN113904770B (en) A quantum noise stream encryption key update method, device and storage medium
US20170170953A1 (en) Decoy bits method for direct encryption and key generation
US20090323955A1 (en) Data transmitting apparatus and data receiving apparatus
JP2008245053A (en) Method and device for optical-communication quantum cryptographic communication
US10756891B2 (en) Secure data communication
JP4906732B2 (en) Data transmission device, data reception device, and data communication device
Donnet et al. Security of Y-00 under heterodyne measurement and fast correlation attack
JP6059959B2 (en) Optical secret communication system, optical secret transmission apparatus, and optical secret communication system control method
Hirota et al. Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol
Jiang et al. Efficient and universal quantum key distribution based on chaos and middleware
JP4879183B2 (en) Data transmitting apparatus and data receiving apparatus
JP5472850B2 (en) Pulse position modulation noise confidential communication system
JP2013021422A (en) Cipher transmission device
US7869600B2 (en) Optical transmitter and transmitting method for transmitting cryptogram
US7907670B2 (en) Data transmitting apparatus and data receiving apparatus
JP5052256B2 (en) Data communication apparatus and data communication method
CN117896064B (en) A low computational overhead superlattice twin PUF key synchronization method and system
JP7430942B2 (en) signal processing system
JP4718222B2 (en) Data transmission device, data reception device, and data communication device
CN113965317B (en) High-speed noise source implementation method and system based on quantum key distribution system
RU2141728C1 (en) Method for encrypting binary information
JP2008079297A (en) Data transmitting apparatus and data receiving apparatus

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20100317

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20120419

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20120424

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20120622

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20120724