CN-122027130-A - Anti-quantum short key dynamic encryption method and system based on modulo-30 structured prime numbers
Abstract
The invention discloses an anti-quantum short key dynamic encryption method and system based on a modular 30 structured prime number, and belongs to the technical field of information security. The method comprises the steps of loading a structured prime number library generated based on a module 30 theory, screening target prime numbers according to security levels, generating an anti-quantum short key pair based on the target prime numbers, generating a shared session key through lightweight negotiation, and dynamically updating the prime numbers and the key through a double-drive mechanism. The invention utilizes the module 30 to structure the prime number space to realize the maximum expansibility and certainty as required, combines the anti-quantum algorithm with the dynamic key update, obviously improves the anti-quantum brute force cracking capability of the short key, simultaneously realizes the extremely simplified key management and the minimum resource expenditure, and is suitable for the lightweight high-dynamic safety communication scenes such as the Internet of things and the Internet of vehicles.
Inventors
- LIU SHIZHANG
- CHEN YUSHENG
Assignees
- 刘诗章
- 陈豫生
Dates
- Publication Date
- 20260512
- Application Date
- 20260203
Claims (6)
- 1. The quantum-resistant short key dynamic encryption method based on the modulo-30 structured prime numbers is characterized by comprising the following steps of: S1, loading a structured prime number library, wherein the prime numbers in the prime number library meet the formula N=30×k+r, wherein k is more than or equal to 0, and r is {1,7,11,13,17,19,23,29}; S2, screening target prime numbers from the prime number library according to the security level of the communication scene; S3, taking the target prime number as a parameter, inputting the target prime number into an anti-quantum cryptographic algorithm, and generating a corresponding public key and a private key, wherein the length of the public key is not more than 512 bytes, and the length of the private key is not more than 1024 bytes; S4, the two communication parties carry out light negotiation based on the target prime numbers to generate a shared session key; S5, dynamically updating the target prime numbers, and updating the short key pair and the session key according to the target prime numbers; S6, carrying out data encryption communication by using the updated session key.
- 2. The method according to claim 1, wherein in step S2, a "modulo-30 prime r value class-security class" mapping relation is established based on the eight-row periodicity law of the modulo-30 structured prime library for screening, wherein a low security class, a low computation scene is adapted by using single prime numbers of r e {1,7} rows, and a high security class scene is adapted by using prime number pairs of r e {17,19} rows.
- 3. The method according to claim 1, wherein in step S3, the anti-quantum cryptography algorithm comprises a lattice-based CRYSTALS Kyber algorithm or a hash-based SPHINCS + algorithm.
- 4. The method according to claim 1, wherein in step S5, the dynamic update includes a periodic update and an event-triggered update, the periodic update having a period of 1 to 60 seconds.
- 5. The method according to claim 1, wherein the structured prime number library in step S1 is generated by matrix puncturing based on modulo 30 reduction remainder, and the method is described in 202511989945.5 patent application, or the method described in patent ZL 201110253413.7.
- 6. An anti-quantum short key dynamic encryption system for implementing the method of any one of claims 1-5, comprising: The system comprises a prime number loading module, a parameter matching module, a key generation module, a negotiation communication module, a dual-drive updating module and a data encryption and decryption module.
Description
Anti-quantum short key dynamic encryption method and system based on modulo-30 structured prime numbers Technical Field The invention relates to the technical field of information security and cryptography, in particular to an anti-quantum short key dynamic encryption method and system suitable for post-quantum time and adaptive lightweight equipment, which are particularly suitable for scenes with high dynamic, resource limited and strict security requirements such as Internet of things, internet of vehicles and government communications. Background In traditional public key cryptography (e.g., RSA, ECC), the key length is directly related to security. In order to resist quantum computing attacks (such as a shell algorithm), the traditional scheme needs to greatly increase the key length, so that computing, storage and transmission overheads are greatly increased, and resource-limited scenes such as the Internet of things and the like are difficult to adapt. Meanwhile, although the existing dynamic key technology (such as ECDHE of TLS 1.3 and a double-ratchet algorithm of Signal protocol) can improve forward confidentiality, the key generation still depends on a random number source, the key space is limited mathematically, the key distribution process is complex, and the risks of man-in-the-middle attack and quantum eavesdropping exist. The inventors first proposed the model 30 theoretical study method in 1986 and obtained Xu Lizhi professor review support in 1991. Based on the theory, two national invention patents of ' a prime number family rapid generation method (ZL 201110253413.7) suitable for information encryption technology application and ' a rapid generation method (ZL 201410123370.4) of even prime number pairs based on even public key cryptosystem application ' are obtained successively. The patent lays a foundation for efficient generation of large-scale structured prime numbers, but dynamic encryption full-flow depth fusion of the modular 30 structured prime numbers and the quantum-resistant short keys is not performed yet. Therefore, a new encryption scheme is needed that can combine deterministic generation capability of infinite prime space with dynamic key system to radically resist quantum brute force cracking while reducing system overhead. In order to solve the above problem, the structured prime database proposed by the inventor in 2025 is generated by 'matrix deletion method' (patent application number 202511989945.5), which provides possibility for realizing the dynamic encryption whole process of the anti-quantum short key. Disclosure of Invention The invention radically reconstructs the safety foundation of the short key by introducing a deterministic entropy source with infinite expansion potential, namely a modular 30 structured prime number. The invention aims to solve the following technical problems: 1. How to combine the periodicity and deterministic advantages of the prime number of the module 30 structured with the quantum-resistant short key, and improve the quantum brute force cracking resistance of the short key; 2. How to realize seamless connection of 'prime number dynamic iteration' and 'key high-frequency update', and avoid security risks caused by key multiplexing and update hysteresis; 3. how to design a lightweight key negotiation mechanism, adapt to the prime number characteristics of the module 30, reduce the communication and calculation cost and meet the requirements of lightweight equipment. (II) technical scheme In order to solve the technical problems, the invention provides the following technical scheme: 1. A quantum-resistant short key dynamic encryption method based on modulo-30 structured prime numbers comprises the following steps: S1, initializing a prime number library, namely loading a structured prime number library, wherein the prime numbers in the prime number library meet the formula of N=30×k+r, wherein k is more than or equal to 0, r is {1,7,11,13,17,19,23,29}, and the prime number library comprises single prime numbers and prime number pairs; S2, prime number-key parameter matching, namely establishing a 'model 30 prime number r value category-quantum key parameter' mapping table according to the security level of a communication scene and the computational power constraint of equipment, and automatically screening an adapted target prime number from the prime number library; S3, generating an anti-quantum short key, namely inputting the target prime number as a parameter into an anti-quantum cryptographic algorithm to generate a corresponding public key and a private key, wherein the length of the public key is not more than 512 bytes, and the length of the private key is not more than 1024 bytes. Such anti-quantum cryptography algorithms include, but are not limited to, the CRYSTALS-Kyber algorithm of radix Yu Ge, the SPHINCS + algorithm based on hash, and the like. S4, lightweight key negotiation, namely, two communication parties exchan