Intranet file encryption system fused with quantum key
CSTR:
Author:
Clc Number:

TP309.7

  • Article
  • | |
  • Metrics
  • |
  • Reference [22]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    With the rapid development of quantum computing technology, encryption technology based on computational complexity is facing a huge threat, and single firewall technology cannot completely prevent hackers from intruding and attacks from the Intranet. The strategy which combines the firewall and quantum private communication technology can solve the above problems effectively. This paper designs a file security system in LAN based on quantum key, using quantum key to encrypt the internal privacy files of the LAN and one-time-pad encryption method can effectively prevent the loss caused by file stolen. The system is composed of two parts:the client software with the file processing unit as the core, and the server with the encryption/decryption information management module as the core component. In order to increase the complexity of ciphertext, the security of key store and the calculation feasibility, this paper proposes three key processing methods:mixed ciphertext splicing, misplaced mixing of weak password and intelligent matching of quantum key, which effectively improve overall security of the system. The effectiveness, security and feasibility of the system are verified by the system function test and network simulation analysis.

    Reference
    [1] 张心怡. 盘点那些置我们于危险之中的信息泄露事件[J]. 大数据时代, 2018(8):64-73.ZHANG Xinyi. Take stock of information leaks that put us at risk[J]. Big Data Time, 2018(8):64-73. (in Chinese)
    [2] Guo Y, Zhang B, Miao W. Research on network information security protection technology based on big data[C]. 2020 International Conference on Computer Information and Big Data Applications (CIBDA). Piscataway, NJ:IEEE,2020:19-22.
    [3] Rao G S, Kumar P, Swetha P, et al. Security assessment of computer networks-an ethical hacker's perspective[C]. International Conference on Computing and Communication Technologies. Piscataway, NJ:IEEE, 2014:1-5.
    [4] Krit S D, Haimoud E. Overview of firewalls:Types and policies:Managing windows embedded firewall programmatically[C]. 2017 International Conference on Engineering & MIS (ICEMIS). Piscataway, NJ:IEEE, 2017:1-7.
    [5] 福罗赞. TCP/IP协议族[M]. 王海,等译. 北京:清华大学出版社, 2016.BehrouzA Forouzan. TCP/IP protocol family[M]. Translated by Wang Hai, et al. Beijing:Tsinghua University Press, 2016. (in Chinese)
    [6] 龙振华. 大数据时代计算机网络信息安全及防护策略[J]. 中国管理信息化, 2019, 22(6):161-162.LONG Zhenhua. Computer network information security and protection strategies in the era of big data[J]. China Management Informatization, 2019, 22(6):161-162. (in Chinese)
    [7] 爨玉伟, 阮晓宏. 基于DES及其改进算法的文件加密系统[J]. 计算机技术与发展, 2014, 24(7):166-169.CUAN Yuwei, RUAN Xiaohong. Encrypted file system based on DES algorithm and its improved algorithm[J]. Computer Technology and Development, 2014, 24(7):166-169. (in Chinese)
    [8] 朱天楠, 施勇, 薛质. 基于Xposed的Android透明文件加密系统的研究[J]. 计算机技术与发展, 2017, 27(2):64-68.ZHU Tiannan, SHI Yong, XUE Zhi. Research on android transparent encryption file system based on xposed[J]. Computer Technology and Development, 2017, 27(2):64-68. (in Chinese)
    [9] 许肖威, 刘雄, 戴一奇. 基于安全局域网分级文件分发系统设计与实现[J]. 计算机应用研究, 2012, 29(11):4246-4249.XU Xiaowei, LIU Xiong, DAI Yiqi. Gradable file distribution system design and implementation based on security LAN[J]. Application Research of Computers, 2012, 29(11):4246-4249. (in Chinese)
    [10] 韩庆龙, 吕洁, 王凤芹. 基于混合加密的移动存储文件安全系统设计与实现[J]. 海军航空工程学院学报, 2017, 32(6):576-580.HAN Qinglong, LV Jie, WANG Fengqin. Journal of naval aeronautical engineering institute, 2017, 32(6):576-580. (in Chinese)
    [11] 陈平, 陈宝桔. 基于混沌文件加密系统的设计与实现[J]. 广东工业大学学报, 2019, 36(1):16-22.CHEN Ping, CHEN Baoju. Design and realization of chaos-based file encryption system[J]. Journal of Guangdong University of Technology, 2019, 36(1):16-22. (in Chinese)
    [12] 林培通. 文件加密系统设计与实现[J]. 电脑知识与技术, 2011, 7(14):3299-3301.LIN Peitong. Design and implementation of a encrypting file system[J]. Computer Knowledge and Technology, 2011, 7(14):3299-3301. (in Chinese)
    [13] Bouwmeester D, Ekert A, Zeilinger A. The physics of quantum information[M]. Berlin, Heidelberg:Springer, 2000.
    [14] Nielsen M A, Chuang I L. Quantum computation and quantum information[M]. Cambridge:Cambridge University Press, 2000.
    [15] Desurvire E. Classical and quantum information theory[M]. Cambridge:Cambridge University Press, 2009.
    [16] Xu F H, Ma X F, Zhang Q, et al. Secure quantum key distribution with realistic devices[J]. Reviews of Modern Physics, 2020, 92(2):025002.
    [17] 王宝楠, 胡风, 张焕国, 等. 从演化密码到量子人工智能密码综述[J]. 计算机研究与发展, 2019, 56(10):2112-2134.WANG Baonan, HU Feng, ZHANG Huanguo, et al. From evolutionary cryptography to quantum artificial intelligent cryptography[J]. Journal of Computer Research and Development, 2019, 56(10):2112-2134. (in Chinese)
    [18] 邢书宝, 李刚, 薛惠锋. 一次一密加密系统设计与实现[J]. 计算机技术与发展, 2007,17(3):150-152, 155.XING Shubao, LI Gang, XUE Huifeng. Design and realization of once a secret key encrypt system[J]. Computer Technology and Development, 2007, 17(3):150-152, 155. (in Chinese)
    [19] Bennett C H, Brassard G. An update on quantum cryptography[M]. Berlin, Heidelberg:Springer, 1984:475-480.
    [20] 焦荣珍, 唐少杰, 张弨. 诱惑态量子密钥分配系统中统计涨落的研究[J]. 物理学报, 2012, 61(5):36-39.JIAO Rongzhen, TANG Shaojie, ZHANG Chao. Analysis of statistical fluctuation in decoy state quantum key distribution system[J]. Acta Physica Sinica, 2012, 61(5):36-39. (in Chinese)
    [21] 赖俊森, 吴冰冰, 汤瑞, 等. 量子通信应用现状及发展分析[J]. 电信科学, 2016, 32(3):123-129.LAI Junsen, WU Binbin, TANG Rui, et al. Analysis on the application and development of quantum communication[J]. Telecommunications Science, 2016, 32(3):123-129. (in Chinese)
    [22] 韩忠明, 刘雯, 李梦琪, 等. 基于节点向量表达的复杂网络社团划分算法[J]. 软件学报, 2019, 30(4):1045-1061.HAN Zhongming, LIU Wen, LI Mengqi, et al. Community detection algorithm based on node embedding vector representation[J]. Journal of Software, 2019, 30(4):1045-1061. (in Chinese)
    Cited by
Get Citation

吴佳楠,唐祁,贺曼丽,贾雯畅,周柚.融合量子密钥的内网文件加密系统[J].重庆大学学报,2020,43(11):41~51

Copy
Share
Article Metrics
  • Abstract:609
  • PDF: 768
  • HTML: 738
  • Cited by: 0
History
  • Received:August 15,2020
  • Online: December 02,2020
  • Published: November 30,2020
Article QR Code