CN-118631447-B - TLCP communication method and system for resisting quantum attack
Abstract
The invention relates to the technical field of information security, in particular to a TLCP communication method and a TLCP communication system for resisting quantum attack, wherein the method comprises the steps that after a server receives a communication request of a client, a traditional key exchange parameter and a mixed signature are generated and sent to the client along with a mixed signature double certificate; the client verifies the mixed signature double certificate and the mixed signature, constructs a mixed key exchange parameter and sends the mixed key exchange parameter to the server, meanwhile, generates a mixed premaster key as a key seed for subsequent other key derivation, and the server decrypts the mixed key exchange parameter to generate the mixed premaster key as the key seed for subsequent other key derivation. The invention can ensure that the client and the server safely establish communication under the quantum attack environment.
Inventors
- WEI MENGMENG
- YANG GUOQIANG
- SUN YU
- Song Changran
Assignees
- 山东多次方半导体有限公司
- 三未信安科技股份有限公司
Dates
- Publication Date
- 20260508
- Application Date
- 20240709
Claims (9)
- 1. A TLCP communication method for combating quantum attacks, comprising the steps of: after receiving a communication request of a client, a server generates a traditional key exchange parameter and a mixed signature, and sends the traditional key exchange parameter and the mixed signature to the client along with a mixed signature double certificate; The client verifies the mixed signature double certificate and the mixed signature, constructs a mixed key exchange parameter and sends the mixed key exchange parameter to the server, and meanwhile, generates a mixed premaster secret key as a secret key seed for the subsequent derivation of other secret keys; The server decrypts the mixed key exchange parameter to generate a mixed premaster key as a key seed for the subsequent derivation of other keys; The client side constructs the mixed key exchange parameter and the mixed premaster secret key in the following way: The client extracts an anti-quantum cryptographic key encapsulation algorithm public key SERVERPKPQCENC of the server from the public key field of the hybrid encryption certificate and encrypts a public key SERVERPKGMENC by using the traditional public key cryptographic algorithm, performs anti-quantum cryptographic key encapsulation operation by using a public key SERVERPKPQCENC, and generates an anti-quantum cryptographic key encapsulation ciphertext cPQC and a sharing key ss, (cPQC, ss) = EncPQC (ServerPKPQCenc); Generating a conventional public key cipher ciphertext cgm= EncGM (pms, SERVERPKGMENC) using the randomly selected premaster secret key pms and the public key SERVERPKGMENC, generating a hybrid key exchange parameter ClientMixParams = cPQC ||cgm and a hybrid premaster secret key mixpms =ss||pms; wherein EncPQC () represents an anti-quantum cryptographic key encapsulation operation, encGM () represents a conventional public key cryptographic encryption operation, clientMixParams represents a Client hybrid key exchange parameter, and || represents a join operation.
- 2. The TLCP communication method of claim 1, wherein the server generating the conventional key exchange parameters and the hybrid signature comprises: The Server constructs a traditional key exchange parameter SERVERGMPARAMS, signs a private key SERVERSKPQCSIG by using an own anti-quantum cryptographic algorithm to generate an anti-quantum signature sigPQC = SignPQC (SERVERGMPARAMS, SERVERSKPQCSIG) of the exchange parameter, signs a private key SERVERSKGMSIG by using an own traditional public key cryptographic algorithm to generate a traditional public key cryptographic signature sigGM = SignGM (SERVERGMPARAMS, SERVERSKGMSIG) of the exchange parameter, and generates a mixed signature server_ mixsig = sigPQC || sigGM; Transmitting the traditional key exchange parameter SERVERGMPARAMS and the mixed signature Server_ mixsig to the client together with the mixed signature double certificate; The mixed signature double certificate is a mixed signature certificate and a mixed encryption certificate which are applied by a Server in advance to a certificate issuing mechanism and provided with an anti-quantum password signature and a traditional public key password signature, SERVERGMPARAMS represents a traditional public key password key exchange parameter of a Server of the existing TLCP, signPQC () represents an anti-quantum password signature operation, signGM () represents a traditional public key password signature operation, and || represents a connection operation, and server_ mixsig represents a Server mixed signature.
- 3. The method for TLCP communication against quantum attack of claim 1 wherein said client verifies said hybrid signed double certificate by using a certificate chain to verify the validity of said hybrid signed double certificate.
- 4. The TLCP communication method of claim 2, wherein the client verifies the hybrid signature by: Extracting an anti-quantum cryptographic signature public key SERVERPKPQCSIG of the server and a traditional public key cryptographic algorithm signature public key SERVERPKGMSIG from a public key field of the mixed signature certificate; Extracting an anti-quantum signature sigPQC of the mixed signature server_ mixsig, verifying the anti-quantum signature sigPQC by using a traditional key exchange parameter SERVERGMPARAMS and a public key SERVERPKPQCSIG, and calculating a= VERIFYPQC (sigPQC, serverGMParams, serverPKPQCsig); Extracting a traditional public key cryptographic signature sigGM of the mixed signature server_ mixsig, verifying a traditional public key cryptographic signature sigGM by using a traditional key exchange parameter SERVERGMPARAMS and a public key SERVERPKSM sig, and calculating b= VerifyGM (sigGM, serverGMParams, serverPKGMsig); when a and b are true at the same time, the verification is passed, otherwise, the client closes the connection with the server; wherein VERIFYPQC () represents a verification operation against quantum cryptographic signatures, verifyGM () represents a verification operation against conventional public key cryptographic signatures.
- 5. The TLCP communication method of claim 4, wherein the process of the server decrypting the hybrid key exchange parameters and generating the hybrid premaster secret comprises: The server firstly extracts an anti-quantum cryptographic key encapsulation ciphertext cPQC and a traditional public key cryptographic ciphertext cGM from the mixed key exchange parameter, then de-encapsulates cPQC by using a private key SERVERSKPQCENC of an own anti-quantum cryptographic key encapsulation algorithm to obtain a shared key ss= DecPQC (cPQC, serverSKPQCenc), decrypts the cGM by using a private key SERVERSKGMENC of own traditional public key cryptographic encryption to obtain a premaster key pms= DecGM (cGM, serverSKGMenc), and generates a mixed premaster key mixpms =ss||pms; Wherein DecPQC () represents an anti-quantum cryptographic key decapsulation operation, decGM () represents a conventional public key cryptographic decryption operation.
- 6. The method for TLCP communication against quantum attack according to claim 5, wherein the server side employs a conventional public key cryptographic signature algorithm of SM2, the client side employs an anti-quantum cryptographic signature algorithm of Dilithium, the client side employs an anti-quantum cryptographic key encapsulation algorithm of Kyber, and the server side employs a conventional public key cryptographic encryption algorithm of SM2.
- 7. A dual-system TLCP communication method for resisting quantum attack is characterized by comprising the following steps: the method comprises the steps that a client sends a communication request to a server, the server receives the communication request sent by the client and then judges to execute the existing TLCP protocol or the quantum-resistant TLCP protocol, and when the quantum-resistant TLCP protocol is executed, the method is executed according to the quantum attack resistant communication method according to any one of claims 1-6.
- 8. A TLCP communication system for resisting quantum attack, which is characterized in that the TLCP communication system is suitable for the TLCP communication method for resisting quantum attack according to any one of claims 1-6, and comprises a signature module, a verification module and a decryption module; the signature module is used for generating traditional key exchange parameters and a mixed signature at the server and sending the traditional key exchange parameters and the mixed signature to the client together with the mixed signature double certificate; the verification module is used for verifying the mixed signature double certificate and the mixed signature at the client, constructing a mixed key exchange parameter and sending the parameter to the server, and generating a mixed premaster secret key as a secret key seed for the subsequent derivation of other secret keys; The decryption module is used for decrypting the mixed key exchange parameter at the server side to generate a mixed premaster key as a key seed for the subsequent derivation of other keys.
- 9. A dual-system TLCP communication system for resisting quantum attack is characterized by comprising an existing TLCP protocol module, a quantum-resisting TLCP protocol module and a judging module; the existing TLCP protocol module is configured to execute an existing TLCP protocol; The quantum-resistant TLCP protocol module is used for executing the quantum-resistant TLCP protocol according to the communication method for resisting quantum attack according to any one of claims 1-6, and generating a mixed premaster secret key at a client and a server respectively; The judging module is used for judging and executing the existing TLCP protocol or quantum-resistant TLCP protocol after the server receives the communication request sent by the client; the existing TLCP protocol module is further configured to use the hybrid premaster secret key generated by the server and the client as a seed, and perform derivation of other secret keys through a secret key derivation algorithm in the existing TLCP protocol.
Description
TLCP communication method and system for resisting quantum attack Technical Field The invention relates to the technical field of information security, in particular to a TLCP communication method and system for resisting quantum attack. Background With the rapid increase of the operational capability of quantum computers, traditional public key cryptography algorithms based on the mathematical difficulty problem are no longer secure. At present, in the process of establishing communication between a client and a server, the conventional public key cryptographic algorithm is mainly adopted by the conventional TLCP, however, the conventional TLCP does not have the capability of resisting quantum attack, and the conventional TLCP faces the security threat which a quantum computer may form on the conventional public key cryptographic algorithm. Therefore, how to ensure that the client and the server establish a trusted path becomes a technical problem that needs to be solved by those skilled in the art. Disclosure of Invention In view of this, the present invention provides a TLCP communication method and system for resisting quantum attack, which can ensure that a client and a server safely establish communication in a quantum attack environment. In order to achieve the above purpose, the present invention adopts the following technical scheme: in a first aspect, the present invention provides a TLCP communication method for combating quantum attacks, comprising the steps of: after receiving a communication request of a client, a server generates a traditional key exchange parameter and a mixed signature, and sends the traditional key exchange parameter and the mixed signature to the client along with a mixed signature double certificate; The client verifies the mixed signature double certificate and the mixed signature, constructs a mixed key exchange parameter and sends the mixed key exchange parameter to the server, and meanwhile, generates a mixed premaster secret key as a secret key seed for the subsequent derivation of other secret keys; The server decrypts the mixed key exchange parameters to generate a mixed premaster key as a key seed for subsequent other key derivation. Further, the process of generating the traditional key exchange parameter and the mixed signature by the server side comprises the following steps: The Server constructs a traditional key exchange parameter SERVERGMPARAMS, signs a private key ServerSK PQCsig by using an own anti-quantum cryptographic algorithm to generate an anti-quantum signature sig PQC=SignPQC(ServerGMParams, ServerSKPQCsig for the exchange parameter, signs a private key ServerSK GMsig by using an own traditional public key cryptographic algorithm to generate a traditional public key cryptographic signature sig GM=SignGM(ServerGMParams, ServerSKGMsig for the exchange parameter, and generates a mixed signature server_ mixsig =sig PQC|| sigGM; Transmitting the traditional key exchange parameter SERVERGMPARAMS and the mixed signature Server_ mixsig to the client together with the mixed signature double certificate; The mixed signature double certificate is a mixed signature certificate and a mixed encryption certificate which are applied by a Server in advance to a certificate issuing mechanism and provided with an anti-quantum password signature and a traditional public key password signature, SERVERGMPARAMS represents a traditional public key password key exchange parameter of a Server of the existing TLCP, sign PQC () represents an anti-quantum password signature operation, sign GM () represents a traditional public key password signature operation, I represents a connection operation, and server_ mixsig represents a Server mixed signature. Further, the verification mode of the client side on the mixed signature double certificate is that the validity of the mixed signature double certificate is verified by using a certificate chain. Further, the method for verifying the mixed signature by the client side is as follows: Extracting an anti-quantum cryptographic signature public key ServerPK PQCsig of the server and a traditional public key cryptographic algorithm signature public key ServerPK GMsig from a public key field of the mixed signature certificate; Extracting an anti-quantum signature sig PQC of the mixed signature server_ mixsig, verifying the anti-quantum signature sig PQC by using a traditional key exchange parameter SERVERGMPARAMS and a public key ServerPK PQCsig, and calculating a=verify PQC(sigPQC, ServerGMParams, ServerPKPQCsig); Extracting a traditional public key cryptographic signature sig GM of the mixed signature server_ mixsig, verifying a traditional public key cryptographic signature sig GM by using a traditional key exchange parameter SERVERGMPARAMS and a public key ServerPK SM2sig, and calculating b=verify GM(sigGM, ServerGMParams, ServerPKGMsig); when a and b are true at the same time, the verification is passed, otherwise, the client clo