
quantum encryption mode based on real-time conditions,
thereby providing an adaptive mechanism designed to resist
quantum attacks effectively. This study can significantly
enhance the security and reliability of data transmission, thereby
achieving a higher standard of data protection.
II. BACKGROUND
A. SSL Protocol
Secure Sockets Layer (SSL) is a secure transmission
protocol located between the application layer and the transport
layer in the TCP/IP protocol[12]. It operates by establishing an
encrypted link between a client and a server, ensuring that the
data transmitted between them remains confidential and
integral[13]. The SSL protocol defines a set of encryption
algorithms and key exchange methods as cipher suites, which
are negotiated and used to generate session keys during the SSL
handshake process[14]. Choosing the appropriate cipher suite is
crucial for ensuring the security of communication.
B. National Secret Algorithms
National secret algorithms are mainly divided into three
categories: symmetric cryptographic algorithms, asymmetric
cryptographic algorithms, and hash algorithms[15]. Among
them, SM2 is an asymmetric encryption algorithm, mainly used
for certificate verification and key negotiation[16]. SM3 is
suitable for scenarios such as digital signature and message
verification scenarios. It is an algorithm improved based on
SHA-256 and has high security[17].SM4, as the block cipher
standard for commercial ciphers in my country, is mainly used
in data encryption scenarios[18]. In the national secret SSL
protocol of this article, the SM4 algorithm can be used for data
encryption.
III. SYSTEM ARCHITECTURE
The system architecture designed in this paper is shown in
Fig.1.
Fig. 1. System architecture.
The quantum key storage device is abstracted as a Quantum
Key Pool (QKP). When the remaining quantum key quantity in
the pool meets the requirements, this approach uses the quantum
key negotiated by the Quantum Key Distribution (QKD) system
as the session key for the SSL protocol and introduces national
cryptographic algorithms to enhance security. When the
remaining quantum key quantity in the pool does not meet the
requirements, it automatically switches to a post-quantum
cryptographic mode. The primary objective of the system
architecture design is to seamlessly blend QKD with existing
security protocols and switch to the post-quantum cryptographic
algorithm when necessary.
A. SSL Handshake Process Based on National Cryptography
under the Quantum Mode
In the SSL handshake process operating in quantum mode,
the client first selects a quantum key from the key pool for use
in the subsequent sessions. This selected quantum key is then
combined with its associated key identifier and hashed by the
SM3 algorithm. The hash value obtained is then included in the
client's random number A, calculated as shown in (1):
( )
3 A SM Key _ Id QKD _ Key=+
()
Where
,
respectively represented the
quantum key identifier and quantum key. The client sends the
server a Client Hello request, principally informing the server of
its supported protocol version, random number A, encryption
method, and other necessary information.
Upon receiving the client's request, the server traverses
the .txt file where quantum keys are stored, seeking a data set
that satisfies the condition "SM3(Quantum Key Identifier,
Quantum Key) = Random Number A". If such a data set is found,
the identifier of the quantum key mode is set to 1, indicating that
the quantum key in this data set becomes the session master key
for subsequent communications between the two parties.
Conversely, if no matching data is found, the identifier is set to
0, implying that the communication will proceed using session
keys negotiated in the traditional mode, without utilizing
quantum keys.
Ultimately, the value of this identifier replaces the last digit
of the random number B destined for the client and is transmitted
via a Server Hello request. Additionally, the server selects a
national cryptographic suite from the cipher suites provided by
the client for subsequent communication and sends the
corresponding national cryptographic certificate to the client for
identity verification. Upon receiving the server's response, the
client validates the server's certificate and processes the received
server random number B. Based on the last digit of the random
number B, the client determines whether the server supports the
quantum key as the master key for communication.
Subsequently, the client encrypts and sends the random number
C using the server's SM3 public key. Upon receiving the
encrypted random number C, the server decrypts it with its own
SM3 private key.
The server and client generate the session master key
through random numbers A, B, and C. When the remaining
quantum key quantity in the key pool meets the requirements,
the quantum key mode is adopted. Both communicating parties
replace the previously generated master key with the negotiated
quantum key. At this point, the identity authentication and key
negotiation processes between the parties are completed, and
Authorized licensed use limited to: ZTE CORPORATION. Downloaded on November 26,2024 at 05:49:02 UTC from IEEE Xplore. Restrictions apply.
文档被以下合辑收录
评论