信息网络安全 ›› 2019, Vol. 19 ›› Issue (10): 84-90.doi: 10.3969/j.issn.1671-1122.2019.10.011

• 理论研究 • 上一篇    下一篇

基于Polar码的密钥交换方案

李喆, 韩益亮(), 李鱼   

  1. 武警工程大学密码工程学院,陕西西安710086
  • 收稿日期:2019-08-10 出版日期:2019-10-10 发布日期:2020-05-11
  • 通讯作者: 韩益亮 E-mail:hanyil@163.com
  • 作者简介:

    作者简介:李喆(1994—),男,安徽,硕士研究生,主要研究方向为抗量子密码;韩益亮(1977—),男,甘肃,教授,博士,主要研究方向为信息安全、抗量子密码;李鱼(1995—),男,重庆,硕士研究生,主要研究方向为抗量子密码。

  • 基金资助:
    国家自然科学基金[61572521]

A Key Exchange Cryptosystem Based on Polar Codes

Zhe LI, Yiliang HAN(), Yu LI   

  1. College of Cryptographic Engineering, Engineering University of PAP, Xi’an Shaanxi 710086, China
  • Received:2019-08-10 Online:2019-10-10 Published:2020-05-11
  • Contact: Yiliang HAN E-mail:hanyil@163.com

摘要:

文章利用Polar码的极化性质,在McEliece加密方案的基础上,提出了基于Polar码的密钥交换方案。文章构造了可行的密钥交换方案,该方案仅涉及线性计算,计算效率较高,降低了运算复杂度。从安全保密的角度对该方案进行分析,可以发现该方案不仅具有计算困难性,而且具有安全保密性。目前存在的穷举攻击和选择密文攻击不会降低该方案的安全性,通信的双方可以在不安全的公开信道上共享秘密的会话密钥。通过改进的密钥存储方法存储密钥,包括公钥和私钥,降低了密钥存储空间,为即将来临的5G时代提供了实用化的轻型密钥交换方案,提高了信息数据传输速率。

关键词: Polar码, McEliece, 密钥交换, 安全保密性, 5G

Abstract:

Based on the Polar codes, a key exchange cryptosystem based on Polar codes is proposed. This paper construct the key exchange scheme, the scheme proposed in this paper only involves linear calculation and has high efficiency, reduced computational complexity.The scheme is analyzed from the perspective of security and confidentiality.The present exhaustive attacks and selective ciphertext attacks will not reduce the security of this scheme, the two parties of communication can share the secret session key on the insecure open letter.This paper stores the key (public key, private key) through the improved key storage method, reduces the key storage space, and it provides practical light key exchange scheme for the coming 5G era, further improving the transmission rate of information and data, making it more safe and efficient in the high-speed and intelligent 5G era channel transmission process.

Key words: polar codes, McEliece, key exchange, security confidentiality, 5G

中图分类号: