KR102308247B1 - Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same - Google Patents

Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same Download PDF

Info

Publication number
KR102308247B1
KR102308247B1 KR1020200018957A KR20200018957A KR102308247B1 KR 102308247 B1 KR102308247 B1 KR 102308247B1 KR 1020200018957 A KR1020200018957 A KR 1020200018957A KR 20200018957 A KR20200018957 A KR 20200018957A KR 102308247 B1 KR102308247 B1 KR 102308247B1
Authority
KR
South Korea
Prior art keywords
quantum
user
secret
user terminal
encryption
Prior art date
Application number
KR1020200018957A
Other languages
Korean (ko)
Other versions
KR20210104337A (en
Inventor
정부석
남대현
백정현
조성준
서강원
Original Assignee
주식회사 이와이엘
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 이와이엘 filed Critical 주식회사 이와이엘
Priority to KR1020200018957A priority Critical patent/KR102308247B1/en
Priority to EP21756651.2A priority patent/EP4109811A4/en
Priority to PCT/KR2021/002002 priority patent/WO2021167336A1/en
Priority to US17/800,053 priority patent/US20230070408A1/en
Publication of KR20210104337A publication Critical patent/KR20210104337A/en
Application granted granted Critical
Publication of KR102308247B1 publication Critical patent/KR102308247B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

본 발명은 양자난수 기반의 암호칩이 탑재된 비화기기를 이용한 비화통신 제공방법에 관한 것이다. 제1사용자단말기가 비화통신을 위한 비화기기 서비스앱를 실행하여 PIN 또는 패턴을 입력하면, 제1사용자 비화기기와 제1사용자단말기간 기기인증 후, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 사용자인증이 완료되면, 제1사용자비화기기의 양자암호화칩에서 양자비밀키 a를 생성하고, 양자공개키 A를 제2사용자비화기기에 전송하는 단계와, 제1사용자비화기기가 양자암호키를 유도 및 저장하여 제2사용자 비화기기와 암호화된 데이터 통신 채널을 생성하는 단계를 포함한다. The present invention relates to a method for providing secret communication using a secret device equipped with a quantum random number-based encryption chip. When the first user terminal executes the secret device service app for secret communication and inputs a PIN or pattern, after device authentication between the first user secret device and the first user terminal, remote authentication between the first user terminal and the management server is performed. Step, when the user authentication is completed, generating a quantum secret key a in the quantum encryption chip of the first user secret device, and transmitting the quantum public key A to the second user secret device; and generating an encrypted data communication channel with the second user secret device by deriving and storing the encryption key.

Description

양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공방법{Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same}Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same}

본 발명은 양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공 방법에 관한 것으로, 특히, 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 통해 엔드-투-엔드 단말기간에 암호화된 텍스트메시지 또는 파일 전송이 가능하여 보안성이 향상된 양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공방법에 관한 것이다. The present invention relates to a secret device equipped with a quantum encryption chip based on a quantum random number and a method for providing a secret communication service using the same. To a secret device equipped with a quantum random number-based quantum encryption chip with improved security by enabling transmission of an encrypted text message or file, and a method for providing a secret communication service using the same.

최근 유무선 통화 내용을 도청하는 기술이 상당히 발달하여 기술정보를 비롯하여 각종 사생활 정보를 유출되어 경제적 또는 사회적문제를 야기하고 있다. 국방분야 뿐 아니라 국가 간의 정보전쟁, 사활을 건 기업간의 경쟁, 정치활동 등의 현장에서 도청이 만연하고 있다. 특히 스마트폰은 해킹·도청에 취약하며, 특히 무선통신망에 대한 보안은 현재 심각한 상황이다. In recent years, the technology for wiretapping the contents of wired and wireless calls has developed considerably, and various kinds of personal information, including technical information, are leaked, causing economic or social problems. Wiretapping is widespread not only in the field of national defense, but also in information wars between countries, competition between life and death companies, and political activities. In particular, smartphones are vulnerable to hacking and eavesdropping, and the security of wireless communication networks in particular is currently serious.

또한, 메신저 애플리케이션을 이용하여 텍스트메시지 전송 및 파일 전송이 보편화됨에 따라 이에 대한 보안대책이 시급하다. In addition, as text message transmission and file transmission using messenger applications become common, security measures are urgently needed.

이러한 문제를 해결하기 위해 다양한 형태의 비화통신장치가 개발되고 있으나, 의사 난수 기반의 암호키 생성을 통한 비화통신기술로 해킹에 취약한 문제가 있다. 선행기술로는 등록특허 제10-1107241호(비화 통신을 제공하는 장치 및 방법)가 있으나, 휴대 전화기와 연결된 비화 통신용 동글을 통해 비화 통신하는 기술이 개시되어 있으나 보안에 취약한 문제점이 있다. In order to solve this problem, various types of secret communication devices have been developed, but there is a problem that is vulnerable to hacking due to the secret communication technology through pseudo-random number-based encryption key generation. As a prior art, there is registered Patent No. 10-1107241 (device and method for providing secret communication), but a technology for secret communication through a dongle for secret communication connected to a mobile phone is disclosed, but has a weak security problem.

본 발명이 해결하고자 하는 과제는 텍스트메시지 및 파일 전송시 보안에 취약한 문제를 해결하기 위해 양자난수 기반의 양자암호화칩이 탑재된 비화기기 및 이를 이용한 비화통신 서비스 제공방법을 구현하는 것이다.The problem to be solved by the present invention is to implement a secret device equipped with a quantum random number-based quantum encryption chip and a method for providing a secret communication service using the same in order to solve the problem of vulnerability in security when transmitting text messages and files.

본 발명은 안출된 과제를 해결하기 위해 암호화된 데이터 통신 채널을 생성하는 단계와 데이터 통신을 수행하는 단계로 구분되며, 데이터 통신 채널을 생성하는 단계는 제1사용자단말기가 비화통신을 위한 비화기기 서비스앱를 실행하여 PIN 또는 패턴을 입력하면, 제1사용자 비화기기와 제1사용자단말기간 기기인증 후, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 사용자인증이 완료되면, 제1사용자비화기기의 양자암호화칩에서 양자비밀키 a를 생성하고, 양자공개키 A를 제2사용자비화기기에 전송하는 단계와, 제1사용자비화기기가 양자암호키를 유도 및 저장하여 제2사용자 비화기기와 암호화된 데이터 통신 채널을 생성하는 단계를 포함한다. The present invention is divided into a step of generating an encrypted data communication channel and a step of performing data communication in order to solve the devised problem, and the step of generating the data communication channel is a secret device service for the first user terminal After running the app and entering a PIN or pattern, after device authentication between the first user secret device and the first user terminal, performing remote authentication between the first user terminal and the management server, and when user authentication is completed, the first user generating a quantum secret key a from the quantum encryption chip of the secret device, and transmitting the quantum public key A to a second user secret device; and creating an encrypted data communication channel.

데이터 통신을 수행하는 단계는, 제1사용자단말기가 비화통신을 위한 서비스를 실행하여 제1사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 제2사용자단말기가 비화통신을 위한 서비스를 실행하여 제2사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제2사용자단말기와 관리서버간 리모트 인증을 수행하는 단계와, 인증이 완료되어 사용자에 의해 데이터가 제1사용자단말기에 입력되면, 제1사용자단말기는 제1사용자비화기기에 입력된 데이터를 송신하고, 제1사용자단말기는 수신된 데이터를 암호화하여 제1사용자단말기를 통해 제2사용자단말기에 송신하는 단계와, 상기 제2사용자단말기에서 암호화된 데이터를 수신하면, 제2사용자비화기기에 전달하고, 제2사용자비화기기는 데이터를 복호화하고 제2사용자단말기에 전달하여 복호화된 데이터를 확인하는 단계를 포함한다.In the step of performing data communication, the first user terminal executes a service for secret communication, performs device authentication through user authentication between the first user secret device and the app, and performs remote authentication between the first user terminal and the management server The second user terminal executing a service for secret communication, performing device authentication through user authentication between the second user secret device and the app, and performing remote authentication between the second user terminal and the management server; When authentication is completed and data is input to the first user terminal by the user, the first user terminal transmits the data input to the first user secret device, and the first user terminal encrypts the received data to the first user terminal Transmitting to a second user terminal through the; and when the encrypted data is received from the second user terminal, it is transmitted to a second user secret device, and the second user secret device decrypts the data and delivers it to the second user terminal and confirming the decrypted data.

본 발명에 의하면 양자난수기반의 양자암호화칩이 탑재된 비화기기를 사용하고, 엔드-투-엔드 단말기간 암호화된 텍스트메시지 및 파일 전송이 가능하며 양자암호화키를 통하여 보안성이 향상되는 효과가 있다. According to the present invention, it is possible to transmit encrypted text messages and files between end-to-end terminals using a secret device equipped with a quantum encryption chip based on quantum random number, and there is an effect of improving security through a quantum encryption key. .

스마트폰 또는 IoT기기와 분리된 별도의 비화기기를 제공하여 보안성이 향상되며, 다양한 암호알고리즘을 탑재하여 다양한 서비스 플랫폼과 유연하게 연동할 수 있는 효과가 있다. Security is improved by providing a separate secret device separated from a smartphone or IoT device, and it has the effect of being able to flexibly interwork with various service platforms by mounting various cryptographic algorithms.

도 1은 본 발명의 실시예에 따른 양자난수 기반의 암호칩이 탑재된 비화기기의 동작 방법을 설명하는 개념도이다.
도 2는 본 발명의 실시예에 따른 양자키 교환방법을 설명하는 순서도이다.
도 3은 본 발명의 실시예에 따른 암호화된 데이터 통신방법을 설명하는 순서도이다.
도 4는 본 발명의 실시예에 따른 비화기기의 구성을 설명하는 블록도이다.
1 is a conceptual diagram illustrating a method of operating a secret device equipped with an encryption chip based on a quantum random number according to an embodiment of the present invention.
2 is a flowchart illustrating a quantum key exchange method according to an embodiment of the present invention.
3 is a flowchart illustrating an encrypted data communication method according to an embodiment of the present invention.
4 is a block diagram illustrating the configuration of a secret device according to an embodiment of the present invention.

본 명세서에 개시되어 있는 본 발명의 개념에 따른 실시예들에 대해서 특정한 구조적 또는 기능적 설명은 단지 본 발명의 개념에 따른 실시예들을 설명하기 위한 목적으로 예시 된 것으로서, 본 발명의 개념에 따른 실시예들은 다양한 형태들로 실시될 수 있으며 본 명세서에 설명된 실시예들에 한정되지 않는다.Specific structural or functional descriptions of the embodiments according to the concept of the present invention disclosed in this specification are merely illustrative for the purpose of describing the embodiments according to the concept of the present invention, and the embodiments according to the concept of the present invention These may be embodied in various forms and are not limited to the embodiments described herein.

본 발명의 개념에 따른 실시예들은 다양한 변경들을 가할 수 있고 여러 가지 형태들을 가질 수 있으므로 실시예들을 도면에 예시하고 본 명세서에서 상세하게 설명하고자 한다. 그러나 이는 본 발명의 개념에 따른 실시예들을 특정한 개시 형태들에 대해 한정하려는 것이 아니며, 본 발명의 사상 및 기술 범위에 포함되는 모든 변경, 균등물 또는 대체물을 포함한다.Since the embodiments according to the concept of the present invention may have various changes and may have various forms, the embodiments will be illustrated in the drawings and described in detail herein. However, this is not intended to limit the embodiments according to the concept of the present invention to specific disclosed forms, and includes all modifications, equivalents or replacements included in the spirit and scope of the present invention.

본 명세서에서 사용한 용어는 단지 특정한 실시예를 설명하기 위해 사용된 것으로서, 본 발명을 한정하려는 의도가 아니다. 단수의 표현은 문맥상 명백하게 다르게 뜻하지 않는 한, 복수의 표현을 포함한다. 본 명세서에서, "포함하다" 또는 "가지다" 등의 용어는 본 명세서에 기재된 특징, 숫자, 단계, 동작, 구성 요소, 부분품 또는 이들을 조합한 것이 존재함을 지정하려는 것이지, 하나 또는 그 이상의 다른 특징들이나 숫자, 단계, 동작, 구성 요소, 부분품 또는 이들을 조합한 것들의 존재 또는 부가 가능성을 미리 배제하지 않는 것으로 이해되어야 한다.The terms used herein are used only to describe specific embodiments, and are not intended to limit the present invention. The singular expression includes the plural expression unless the context clearly dictates otherwise. In the present specification, terms such as "comprise" or "have" are intended to designate that a feature, number, step, operation, component, part, or combination thereof described herein exists, but one or more other features It is to be understood that it does not preclude the possibility of the presence or addition of numbers, steps, operations, components, parts, or combinations thereof.

이하, 본 명세서에 첨부된 도면들을 참조하여 본 발명의 실시예들을 상세히 설명한다.Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

도 1은 본 발명의 실시예에 따른 양자난수 기반의 암호칩이 탑재된 비화기기의 동작 방법을 설명하는 개념도이다.1 is a conceptual diagram illustrating a method of operating a secret device equipped with a quantum random number-based encryption chip according to an embodiment of the present invention.

도 1을 참조하면, 제1사용자는 제1사용자단말기(200)와 블루투스 페어링된 제1사용자 비화기기(100)를 사용하여 관리서버(500)로부터 인증된 사용자들과 비화 데이터 통신을 할 수 있다. 즉, 송신자인 제1사용자는 제1사용자단말기(200)에 데이터(텍스트메시지 또는 파일)를 입력하면, 입력된 데이터를 제1사용자비화기기(100)에 전달하여 양자암호키에 기반하여 암호화되고, 암호화된 데이터가 제1사용자단말기(200)에 전송된 후, 통신망을 거쳐 제2사용자단말기(300)에 전달되고, 제2사용자단말기(300)와 블루투스 페어링된 제2사용자비화기기(400)에 전달되어 양자난수에 기반한 양자암호화키로 복호화 후 제2사용자단말기로 전달되어 수신자인 제2사용자가 확인할 수 있다. 즉, 제1사용자와 제2사용자는 사용자단말기와 페어링된 비화기기 내에 장착된 양자난수기반의 양자암호화칩에 의해 생성된 양자암호키를 사용함으로써 종래의 비화통신보다 보안성이 보다 향상된 비화통신이 가능하다. Referring to FIG. 1 , a first user can communicate secret data with users authenticated by the management server 500 using the first user secret device 100 paired with the first user terminal 200 and Bluetooth. . That is, when the first user who is the sender inputs data (text message or file) to the first user terminal 200, the input data is transmitted to the first user secret device 100 and is encrypted based on the quantum encryption key. , After the encrypted data is transmitted to the first user terminal 200, it is transmitted to the second user terminal 300 through the communication network, and the second user's secret device 400 is Bluetooth-paired with the second user terminal 300 It is transmitted to the second user terminal after decryption with the quantum encryption key based on the quantum random number, so that the second user who is the recipient can check it. That is, the first user and the second user use the quantum encryption key generated by the quantum random number-based quantum encryption chip installed in the secret device paired with the user terminal, so that the security of the secret communication is improved more than that of the conventional secret communication. possible.

도 2는 본 발명의 실시예에 따른 양자암호키 교환방법을 설명하는 순서도이다.2 is a flowchart illustrating a quantum encryption key exchange method according to an embodiment of the present invention.

도 2를 참조하면, 제1사용자 비화기기(100)와 제1사용자단말기(200)가 블루투스 페어링되고(S201), 제1사용자단말기(200)에서 비화통신을 위한 서비스를 실행하고(S203), 제1사용자단말기(200)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S205). PIN 또는 패턴입력을 통해 사용자인증이 입력되면, 제1사용자 비화기기(100)와 제1사용자단말기(200)는 서로 기기인증을 수행한다(S207). 이후에, 제1사용자단말기(200)는 관리서버(500)에 리모트 인증을 수행한다(S209). Referring to FIG. 2 , the first user secret device 100 and the first user terminal 200 are Bluetooth paired (S201), and the first user terminal 200 executes a service for secret communication (S203), User authentication is performed through PIN or pattern input to the first user terminal 200 (S205). When user authentication is input through PIN or pattern input, the first user secret device 100 and the first user terminal 200 perform device authentication with each other (S207). Thereafter, the first user terminal 200 performs remote authentication to the management server 500 (S209).

제2사용자 비화기기(400)와 제2사용자단말기(300)가 블루투스 페어링되고(S211), 제2사용자단말기(300)에서 비화통신을 위한 서비스를 실행하고(S213), 제2사용자단말기(300)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S215). PIN 또는 패턴입력을 통해 사용자인증이 입력되면, 제2사용자 비화기기(400)와 제2사용자단말기(300)는 서로 기기인증을 수행한다(S217). 이후에, 제2사용자단말기는 관리서버(500)에 리모트 인증을 수행한다(S219). The second user secret device 400 and the second user terminal 300 are Bluetooth paired (S211), and the second user terminal 300 executes a service for secret communication (S213), and the second user terminal 300 ) through PIN or pattern input to perform user authentication (S215). When user authentication is input through PIN or pattern input, the second user secret device 400 and the second user terminal 300 perform device authentication with each other (S217). Thereafter, the second user terminal performs remote authentication to the management server 500 (S219).

사용자 인증이 완료되면, 제1사용자 비화기기(100)는 양자비밀키a를 생성하고 저장하고(S221), 제2사용자 비화기기(400)는 양자비밀키b를 생성하고 저장한다(S223). 이때, 양자비밀키a와 양자비밀키b는 양자난수로서, 양자특성을 이용하여 패턴 분석과 예측이 불가능하고 무질서한 순수난수로 생성될 수 있다. When user authentication is completed, the first user secret device 100 generates and stores the quantum secret key a (S221), and the second user secret device 400 generates and stores the quantum secret key b (S223). In this case, the quantum secret key a and the quantum secret key b are quantum random numbers, and pattern analysis and prediction using quantum properties are impossible and can be generated as pure random numbers in disorder.

제1사용자 비화기기(100)는 생성된 양자공개키A를 제2사용자 비화기기(400)에 전송하고(S225), 제2사용자 비화기기(400)는 생성된 양자공개키B를 제1사용자 비화기기(100)에 전송하여(S226) 각각의 양자공개키를 서로 교환한다.The first user secret device 100 transmits the generated quantum public key A to the second user secret device 400 (S225), and the second user secret device 400 transmits the generated quantum public key B to the first user. It is transmitted to the secret device 100 (S226) to exchange each quantum public key with each other.

제1사용자 비화기기(100)는 양자암호키를 유도하여 저장하고(S227), 제2사용자 비화기기(400)는 양자암호키를 유도하여 저장한다(S229). 이를 통해 제1사용자 비화기기(100)와 제2사용자 비화기기(400)는 암호화된 데이터 통신 채널을 생성한다(S231). 이때, 제1사용자 비화기기의 양자난수에서 유도된 유도키로 키 암복호 알고리즘을 통해 암복호화하고, 제2사용자 비화기기의 양자난수에서 유도된 유도키로 암복호 알고리즘을 통해 암복호화하는 암호화된 데이터 통신 채널을 생성할 수 있다.The first user secret device 100 derives and stores the quantum encryption key (S227), and the second user secret device 400 derives and stores the quantum encryption key (S229). Through this, the first user secret device 100 and the second user secret device 400 create an encrypted data communication channel (S231). At this time, encrypted data communication that encrypts and decrypts through a key encryption/decryption algorithm with a derivation key derived from a quantum random number of the first user secret device, and encrypts and decrypts through an encryption/decryption algorithm with a derivation key derived from a quantum random number of a second user secret device You can create channels.

도 3은 본 발명의 실시예에 따른 암호화된 데이터통신방법을 설명하는 순서도이다.3 is a flowchart illustrating an encrypted data communication method according to an embodiment of the present invention.

도 3을 참조하면, 제1사용자 비화기기(100)와 제1사용자단말기(200)가 블루투스 페어링하고(S301), 제1사용자단말기(200)에서 비화통신을 위한 서비스를 실행하여(S303), 제1사용자단말기(200)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S305). PIN 또는 패턴과 같은 사용자인증이 입력되면, 제1사용자 비화기기(100)와 제1사용자단말기(200)는 서로 기기인증을 수행한다(S307). 이후에, 제1사용자단말기(200)는 관리서버(500)에 리모트 인증을 수행한다(S309). Referring to FIG. 3, the first user secret device 100 and the first user terminal 200 perform Bluetooth pairing (S301), and execute a service for secret communication in the first user terminal 200 (S303), User authentication is performed through PIN or pattern input to the first user terminal 200 (S305). When user authentication such as PIN or pattern is input, the first user secret device 100 and the first user terminal 200 perform device authentication with each other (S307). Thereafter, the first user terminal 200 performs remote authentication to the management server 500 (S309).

제2사용자 비화기기(400)와 제2사용자단말기(300)가 블루투스 페어링하고(S311), 제2사용자단말기(300)에서 비화통신을 위한 서비스를 실행하여(S313), 제2사용자단말기(300)에 PIN 또는 패턴 입력을 통해 사용자인증을 수행한다(S315). PIN 또는 패턴과 같은 사용자인증이 입력되면, 제2사용자 비화기기(400)와 제2사용자단말기(300)는 서로 기기인증을 수행한다(S317). 이후에, 제2사용자단말기는 관리서버(500)에 리모트 인증을 수행한다(S319). The second user secret device 400 and the second user terminal 300 perform Bluetooth pairing (S311), and execute a service for secret communication in the second user terminal 300 (S313), the second user terminal 300 ) through PIN or pattern input to perform user authentication (S315). When user authentication such as PIN or pattern is input, the second user secret device 400 and the second user terminal 300 perform device authentication with each other (S317). Thereafter, the second user terminal performs remote authentication to the management server 500 (S319).

제1사용자가 제1사용자단말기에 데이터(텍스트메시지 또는 파일)를 입력하면(S321), 제1사용자단말기(200)는 데이터를 제1사용자비화기기에 송신한다(S323). 제1사용자 비화기기는 수신된 데이터를 양자암호화키를 통해 암호화하고(S325), 암호화된 데이터를 제1사용자단말기(200)로 송신한다. 제1사용자단말기(200)는 관리서버(500) 및 제2사용자단말기(300)를 통해 제2사용자 비화기기(400)에 송신한다(S327). 제2사용자비화기기(400)는 수신된 데이터를 양자암호화키를 통해 복호화하고(S329), 복호화한 데이터를 제2사용자단말기(300)에 전달하여 제2사용자는 데이터를 확인한다(S331). When the first user inputs data (text message or file) to the first user terminal (S321), the first user terminal 200 transmits the data to the first user secret device (S323). The first user secret device encrypts the received data through the quantum encryption key (S325), and transmits the encrypted data to the first user terminal 200. The first user terminal 200 transmits to the second user secret device 400 through the management server 500 and the second user terminal 300 (S327). The second user secret device 400 decrypts the received data through the quantum encryption key (S329), and transmits the decrypted data to the second user terminal 300 to confirm the data by the second user (S331).

즉, 제1사용자(송신자)와 제2사용자(수신자)는 사용자단말기와 페어링된 비화기기에서 생성된 양자암호키를 사용함으로써 종래의 비화통신보다 보안성이 보다 향상된 비화통신이 가능하다. That is, the first user (sender) and the second user (receiver) use the quantum encryption key generated by the secret device paired with the user terminal, thereby enabling secure communication with more improved security than the conventional secret communication.

도 4는 본 발명의 실시예에 따른 비화기기의 구성을 설명하는 블록도이다.4 is a block diagram illustrating the configuration of a secret device according to an embodiment of the present invention.

도 4를 참조하면, 비화기기(100)는 양자암호화칩(110), 메모리부(120), 마이크 및 스피커부(130), 코덱부(141), 통신부(150), 전원제어모듈(160)로 구성된다. Referring to FIG. 4 , the secret device 100 includes a quantum encryption chip 110 , a memory unit 120 , a microphone and speaker unit 130 , a codec unit 141 , a communication unit 150 , and a power control module 160 . is composed of

양자암호화칩(110)는 양자난수생성기(QRNG; 111)와 암호모듈(113)로 구성된다. 양자난수생성기(111)는 양자엔트로피소스(112)를 탑재하여 양자엔트로피소스에 기초하여 양자난수를 생성할 수 있다. 상기 양자난수는 양자특성을 이용하여 패턴 분석과 예측이 불가능하고 무질서한 순수난수로 생성될 수 있다.The quantum encryption chip 110 includes a quantum random number generator (QRNG) 111 and an encryption module 113 . The quantum random number generator 111 may be equipped with a quantum entropy source 112 to generate a quantum random number based on the quantum entropy source. The quantum random number may be generated as a pure random number that cannot be analyzed and predicted and is disordered by using quantum characteristics.

QRNG(111)는 양자엔트로피소스(112)와 DRBG로 구성된다. QRNG(111)는 양자엔트로피소스(112)를 입력값으로하여 DRBG 알고리즘에 의해 양자난수를 생성할 수 있다.The QRNG 111 is composed of a quantum entropy source 112 and a DRBG. The QRNG 111 may generate a quantum random number by the DRBG algorithm using the quantum entropy source 112 as an input value.

암호모듈(113)은 Secure 모듈(115), MCU(117), Side Channel Resistant 모듈(116), 전원모듈(118)로 구성된다. 암호모듈(113)은 QRNG(111)에서 생성된 양자난수를 이용하여 양자암호화키를 생성한다. 생성된 양자암호화키로 암호화 대상에 대하여 Secure모듈(115)내의 AES 알고리즘으로 암호화 및 복호화를 실행하며 생성된 암호화키를 보관할 수 있다. Side Channel Resistant 모듈(116)은 보관된 암호화키를 부채널공격(SCA Attack)으로부터 방어할 수 있다. The encryption module 113 is composed of a Secure module 115 , an MCU 117 , a Side Channel Resistant module 116 , and a power module 118 . The encryption module 113 generates a quantum encryption key using the quantum random number generated in the QRNG 111 . Encryption and decryption are executed with the AES algorithm in the Secure module 115 for the encryption target with the generated quantum encryption key, and the generated encryption key can be stored. The Side Channel Resistant module 116 may protect the stored encryption key from a side channel attack (SCA Attack).

메모리부(120)는 비화기기의 주 메모리로서 생성된 양자 양자키를 저장할 수 있다. 마이크 및 스피커부(130)는 사용자로부터 음성을 입력받거나, 상대방의 음성을 오디오로 변환하여 출력할 수 있다. 코덱부(141)는 음성신호를 디지털 신호로 변환시킬 수 있다.The memory unit 120 may store the generated quantum quantum key as the main memory of the secret device. The microphone and speaker unit 130 may receive a voice input from the user, or convert the other party's voice into audio and output it. The codec unit 141 may convert an audio signal into a digital signal.

통신부(150)는 블루투스를 통해 사용자단말과 연결될 수 있고, 소정의 등록 절차에 따라 사용자단말에 등록되면, 블루투스의 사용자 인증 기능을 이용하여 사용자단말에 등록된 비화기기의 고유 어드레스에 따라 접속된 사용자를 구분할 수 있다.The communication unit 150 may be connected to the user terminal through Bluetooth, and when registered in the user terminal according to a predetermined registration procedure, the user connected according to the unique address of the secret device registered in the user terminal using the user authentication function of Bluetooth can be distinguished.

발명은 도면에 도시된 실시예를 참고로 설명되었으나 이는 예시적인 것에 불과하며, 본 기술 분야의 통상의 지식을 가진 자라면 이로부터 다양한 변형 및 균등한 타 실시 예가 가능하다는 점을 이해할 것이다. 따라서, 본 발명의 진정한 기술적 보호 범위는 첨부된 등록청구범위의 기술적 사상에 의해 정해져야 할 것이다.Although the invention has been described with reference to the embodiment shown in the drawings, this is merely exemplary, and those skilled in the art will understand that various modifications and equivalent other embodiments are possible therefrom. Accordingly, the true technical protection scope of the present invention should be determined by the technical spirit of the appended claims.

100; 비화기기 110; 양자암호화칩
120; 메모리부 130; 마이크 및 스피커부
141; 코덱부 150; 통신부
160; 전원제어모듈
100; igniter 110; Quantum Encryption Chip
120; memory unit 130; microphone and speaker
141; codec unit 150; communication department
160; power control module

Claims (6)

양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법에 있어서,
양자키를 교환하여 암호화 통신 채널을 생성하는 단계와 제1사용자단말기와 제2사용자단말기간 데이터통신하는 단계를 포함하고,
상기 양자키 교환하는 단계는,
제1사용자단말기가 비화통신을 위한 비화기기 서비스앱를 실행하여 PIN 또는 패턴을 입력하면, 제1사용자 비화기기와 제1사용자단말기간 기기인증 후, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계;
사용자인증이 완료되면, 제1사용자비화기기의 양자암호화칩에서 양자비밀키 a 를 생성하고, 양자공개키 A를 제2사용자비화기기에 전송하는 단계; 및
제1사용자비화기기가 양자암호키를 유도 및 저장하여 제2사용자 비화기기와 암호화된 데이터 통신 채널을 생성하는 단계를 포함하고,
상기 제1사용자단말기와 제2사용자단말기간 데이터통신하는 단계는,
제1사용자단말기가 비화통신을 위한 서비스를 실행하여 제1사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제1사용자단말기와 관리서버간 리모트 인증을 수행하는 단계;
제2사용자단말기가 비화통신을 위한 서비스를 실행하여 제2사용자 비화기기와 앱간 사용자인증을 통하여 기기인증을 수행하고, 제2사용자단말기와 관리서버간 리모트 인증을 수행하는 단계;
인증이 완료되어 사용자에 의해 데이터가 제1사용자단말기에 입력되면, 제1사용자단말기는 제1사용자비화기기에 입력된 데이터를 송신하고, 제1사용자단말기는 수신된 데이터를 암호화하여 제1사용자단말기를 통해 제2사용자단말기에 송신하는 단계;
상기 제2사용자단말기에서 암호화된 데이터를 수신하면, 제2사용자비화기기에 전달하고, 제2사용자비화기기는 데이터를 복호화하고 제2사용자단말기에 전달하여 복호화된 데이터를 확인하는 단계를 포함하고,
상기 제1사용자 비화기기와 상기 제2사용자 비화기기는,
양자엔트로피소스와 암호모듈로 구성된 양자암호화칩을 포함하고,
상기 암호모듈은 양자난수생성기에서 생성된 양자난수를 이용하여 양자암호화키를 생성하고, 생성된 양자암호화키로 암호화 대상에 대하여 Secure모듈내의 AES 알고리즘으로 암호화 및 복호화를 실행하며, 생성된 암호화키를 보관하고, 보관된 암호화키를 부채널공격(SCA Attack)으로부터 방어하는 Side Channel Resistant 모듈을 구비하고,
상기 데이터는 텍스트, 파일, 스트리밍 데이터 중 적어도 하나인 것을 특징으로 하는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
In the method of providing a secret communication service using a secret device equipped with a quantum random number-based quantum encryption chip,
Creating an encrypted communication channel by exchanging a quantum key and data communication between a first user terminal and a second user terminal,
The step of exchanging the quantum key,
When the first user terminal executes the secret device service app for secret communication and inputs a PIN or pattern, after device authentication between the first user secret device and the first user terminal, remote authentication between the first user terminal and the management server is performed. step;
When user authentication is completed, generating a quantum secret key a in the quantum encryption chip of the first user secret device, and transmitting the quantum public key A to the second user secret device; and
A first user secret device generating and storing a quantum encryption key to create an encrypted data communication channel with a second user secret device,
The step of data communication between the first user terminal and the second user terminal,
performing, by the first user terminal, a service for secret communication, performing device authentication through user authentication between the first user secret device and the app, and performing remote authentication between the first user terminal and the management server;
performing, by the second user terminal, a service for secret communication, performing device authentication through user authentication between the second user secret device and the app, and performing remote authentication between the second user terminal and the management server;
When authentication is completed and data is input to the first user terminal by the user, the first user terminal transmits the data input to the first user secret device, and the first user terminal encrypts the received data to the first user terminal transmitting to a second user terminal through;
Upon receiving the encrypted data from the second user terminal, it is transmitted to a second user secret device, and the second user secret device decrypts the data and transmits it to the second user terminal to confirm the decrypted data,
The first user secret device and the second user secret device,
It includes a quantum encryption chip consisting of a quantum entropy source and an encryption module,
The encryption module generates a quantum encryption key using the quantum random number generated by the quantum random number generator, performs encryption and decryption with the AES algorithm in the Secure module for the encryption target with the generated quantum encryption key, and stores the generated encryption key and a Side Channel Resistant module that protects the stored encryption key from SCA Attack,
The method of providing a secret communication service using a secret device equipped with a quantum encryption chip based on a quantum random number, characterized in that the data is at least one of text, file, and streaming data.
제1항에 있어서,
상기 암호화된 데이터 통신 채널을 생성하는 단계는,
제1사용자 비화기기의 양자난수에서 유도된 양자키로 암복호 알고리즘을 통해 암복호화하고, 제2사용자비화기기의 양자난수에서 유도된 양자키로 암복호 알고리즘을 통해 암복호화하는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
According to claim 1,
The step of creating the encrypted data communication channel comprises:
A quantum random number-based quantum encryption chip that encrypts and decrypts through an encryption/decryption algorithm with a quantum key derived from the quantum random number of the first user secret device, and encrypts and decrypts through the encryption/decryption algorithm with a quantum key derived from the quantum random number of the second user secret device A method of providing secret communication service using this mounted secret device.
삭제delete 제1항에 있어서,
상기 암호화 및 복호화하는 단계는,
제1사용자 비화기기의 양자난수에서 유도된 양자키로 암복호 알고리즘을 통해 데이터를 암복호화하고, 제2사용자 비화기기의 양자난수에서 유도된 양자키로 데이터를 암복호 알고리즘을 통해 암복호화하는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
According to claim 1,
The encryption and decryption steps include:
Quantum random number based that encrypts and decrypts data through an encryption/decryption algorithm with a quantum key derived from the quantum random number of the first user's secret device, and encrypts and decrypts data through an encryption/decryption algorithm with a quantum key derived from the quantum random number of the second user's secret device A method of providing a secret communication service using a secret device equipped with a quantum encryption chip of
제1항에 있어서,
상기 양자암호화칩은 양자난수생성기를 탑재하여 양자난수를 생산하고, 상기 양자난수는 양자특성을 이용하여 패턴 분석과 예측이 불가능하고 무질서한 순수난수로 생성되는 양자난수 기반의 양자암호화칩이 탑재된 비화기기를 이용한 비화통신 서비스 제공방법.
According to claim 1,
The quantum encryption chip is equipped with a quantum random number generator to produce a quantum random number, and the quantum random number is a quantum random number-based quantum encryption chip that cannot be analyzed and predicted using quantum characteristics and is generated as a disordered pure random number. A method of providing secret communication service using a device.
삭제delete
KR1020200018957A 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same KR102308247B1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020200018957A KR102308247B1 (en) 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
EP21756651.2A EP4109811A4 (en) 2020-02-17 2021-02-17 Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
PCT/KR2021/002002 WO2021167336A1 (en) 2020-02-17 2021-02-17 Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
US17/800,053 US20230070408A1 (en) 2020-02-17 2021-02-17 Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020200018957A KR102308247B1 (en) 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same

Publications (2)

Publication Number Publication Date
KR20210104337A KR20210104337A (en) 2021-08-25
KR102308247B1 true KR102308247B1 (en) 2021-10-01

Family

ID=77495423

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020200018957A KR102308247B1 (en) 2020-02-17 2020-02-17 Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same

Country Status (1)

Country Link
KR (1) KR102308247B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20240018910A (en) 2022-08-03 2024-02-14 경희대학교 산학협력단 Quantum end-to-end encryption system and operating method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100872817B1 (en) * 2006-12-07 2008-12-09 인하대학교 산학협력단 Method for Key Exchange Based on Varient of the Diffie Hellman
KR102023526B1 (en) * 2012-10-29 2019-09-20 아이디 퀀티크 에스.에이. Method for Enhancing Security of Secret Key Generated in Quantum Key Distribution System
KR20160121828A (en) * 2015-04-13 2016-10-21 (주)엑스톤 Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals
KR102017505B1 (en) * 2017-09-25 2019-09-03 주식회사 이와이엘 User authentication method using random number generator

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20240018910A (en) 2022-08-03 2024-02-14 경희대학교 산학협력단 Quantum end-to-end encryption system and operating method thereof

Also Published As

Publication number Publication date
KR20210104337A (en) 2021-08-25

Similar Documents

Publication Publication Date Title
KR101093359B1 (en) Combinational combiner cryptographic method
CN102572817A (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
Ntantogian et al. A survey of voice and communication protection solutions against wiretapping
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
KR101358375B1 (en) Prevention security system and method for smishing
KR101078373B1 (en) System for authenticating a caller and Method thereof
KR102308247B1 (en) Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
CN105262759A (en) Method and system for encrypted communication
EP4109811A1 (en) Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
CN108270917B (en) Encrypted smart phone
US9467428B2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
KR102308246B1 (en) Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
CN114867012A (en) Encryption earphone and voice communication method thereof
CN112054905B (en) Secure communication method and system of mobile terminal
KR102308248B1 (en) Encryption Gateway equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service between IoT device using the same
CN104080080B (en) A kind of data handling system of voice call
KR101293260B1 (en) Mobile communication terminal and method
WO2016030832A1 (en) Method and system for mobile data and communication security
KR101527053B1 (en) System for supporting the mobile terminal having the protection of private life from wiretapping and hacking into network on communications terminal
Berchtold et al. Secure communication protocol for a low-bandwidth audio channel
CN110890968B (en) Instant messaging method, device, equipment and computer readable storage medium
CN108270916A (en) A kind of encryption method of smart mobile phone

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant