期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
256比特密码算法在5G移动通信系统应用中关键问题研究 被引量:7
1
作者 冯程 《信息安全研究》 2020年第8期716-721,共6页
5G R15和R16版本标准规定使用128比特对称密码算法和椭圆曲线公钥算法等提供信息保护能力.由于近年量子计算技术飞速发展,量子计算机可能会威胁到现有的5G系统中使用的密码算法安全能力.3GPP已经开展了研究项目,认为在后续版本的5G标准... 5G R15和R16版本标准规定使用128比特对称密码算法和椭圆曲线公钥算法等提供信息保护能力.由于近年量子计算技术飞速发展,量子计算机可能会威胁到现有的5G系统中使用的密码算法安全能力.3GPP已经开展了研究项目,认为在后续版本的5G标准中,有必要引入256比特对称密码算法和抗量子公钥密码算法.分析了3GPP 5G移动通信系统通信网络密码算法应用方式,深入剖析了新型抗量子计算攻击的密码算法(如256比特对称密码算法、抗量子公钥密码算法)引入后,与现有128比特算法共存时对于系统流程设计、工程实现的影响,为今后5G系统演进提供了重要参考. 展开更多
关键词 5G 码算法 256比特密钥 安全流程 实现性能
下载PDF
对于5轮Camellia密码的Square攻击 被引量:3
2
作者 贺也平 吴文玲 卿斯汉 《中国科学院研究生院学报》 CAS CSCD 2001年第2期177-180,共4页
讨论了Square方法对于Camellia密码的攻击 .结果表明 ,Square方法是攻击Camellia密码最有效的方法之一 .Camellia密码是欧洲NESSIE密码计划中 ,分组密码候选加密算法之一 .它是 1 2 8比特密码分组 ,支持 1 2 8、1 92和 2 5
关键词 分组 Camellia SQUARE攻击 ∧集 网络安全 算法 比特密钥
下载PDF
Performance of an Improved One-Way Error Reconciliation Protocol Based on Key Redistribution 被引量:2
3
作者 ZHAO Feng LI Jingling 《China Communications》 SCIE CSCD 2014年第6期63-70,共8页
In data post-processing for quantum key distribution, it is essential to have a highly efficient error reconciliation protocol. Based on the key redistribution scheme, we analyze a one-way error reconciliation protoco... In data post-processing for quantum key distribution, it is essential to have a highly efficient error reconciliation protocol. Based on the key redistribution scheme, we analyze a one-way error reconciliation protocol by data simulation. The relationship between the error correction capability and the key generation efficiency of three kinds of Hamming code are demonstrated. The simulation results indicate that when the initial error rates are (0,1.5%], (1.5,4%], and (4,11%], using the Hamming (31,26), (15,11), and (7,4) codes to correct the error, respectively, the key generation rate will be maximized. Based on this, we propose a modified one-way error reconciliation protocol which employs a mixed Hamming code concatenation scheme. The error correction capability and key generation rate are verified through data simulation. Using the parameters of the posterior distribution based on the tested data, a simple method for estimating the bit error rate (BER) with a given confidence interval is estimated. The simulation results show that when the initial bit error rate is 10.00%, after 7 rounds of error correction, the error bits are eliminated completely, and the key generation rate is 10.36%; the BER expectation is 2.96×10^-10, and when the confidence is 95% the corresponding BER upper limit is 2.17×10^-9. By comparison, for the single (7,4) Hamming code error reconciliation scheme at a confidence of 95%,the key generation rate is only 6.09%, while the BER expectation is 5.92x 10"9, with a BER upper limit of 4.34×10^-8. Hence, our improved protocol is much better than the original one. 展开更多
关键词 quantum key distribution error reconciliation data post-processing
下载PDF
Multiuser-to-multiuser entanglement distribution based on 1550 nm polarization-entangled photons 被引量:10
4
作者 Dong-Yang Cao 《Science Bulletin》 SCIE EI CAS CSCD 2015年第12期1128-1132,I0003,共6页
Telecom-band polarization-entangled photon- pair source has been widely used in quantum communi- cation due to its acceptable transmission loss. It is also used in cooperation with wavelength-division multiplexing (... Telecom-band polarization-entangled photon- pair source has been widely used in quantum communi- cation due to its acceptable transmission loss. It is also used in cooperation with wavelength-division multiplexing (WDM) to construct entanglement distributor. However, previous schemes generally are not suitable for multinode scenario. In this paper, we construct a telecom-band po- larization-entangled photon-pair source, and it shows ul- trahigh fidelity and concurrence which are both greater than 90 % (raw data). Moreover, we set up a four-by-four entanglement distributor based on WDM. We check the 16 Clauser-Horne-Shimony-Holt inequalities, which show nonlocality. Lastly, as an example of practical application of this source, we estimate the quantum bit error rates and quantum secret key rates when it is used in quantum key distribution. Furthermore, the transmission of entanglement in long optical fibers is also demonstrated. 展开更多
关键词 Entanglement distribution MULTIUSER Telecom-band
原文传递
Performance analysis of quantum key distribution based on air-water channel
5
作者 周媛媛 周学军 《Optoelectronics Letters》 EI 2015年第2期149-152,共4页
Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-w... Considering the air-water interface and ocean water’s optical attenuation,the performance of quantum key distribution(QKD)based on air-water channel is studied.The effects of photons’various incident angles to air-water interface on quantum bit error rate(QBER)and the maximum secure transmission distance are analyzed.Taking the optical attenuation of ocean water into account,the performance bounds of QKD in different types of ocean water are discussed.The simulation results show that the maximum secure transmission distance of QKD gradually reduces as the incident angle from air to ocean water increases.In the clearest ocean water with the lowest attenuation,the maximum secure transmission distance of photons far exceeds the the working depth of underwater vehicles.In intermediate and murky ocean waters with higher attenuation,the secure transmission distance shortens,but the underwater vehicle can deploy other accessorial methods for QKD with perfect security.So the implementation of OKD between the satellite and the underwater vehicle is feasible. 展开更多
关键词 Air Bit error rate Electromagnetic wave attenuation OCEANOGRAPHY Optical communication Phase interfaces PHOTONS Vehicle transmissions VEHICLES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部