[go: up one dir, main page]

WO2019088689A1 - Puf-qrng quantum cryptographic security terminal system and cryptographic key generation method - Google Patents

Puf-qrng quantum cryptographic security terminal system and cryptographic key generation method Download PDF

Info

Publication number
WO2019088689A1
WO2019088689A1 PCT/KR2018/013095 KR2018013095W WO2019088689A1 WO 2019088689 A1 WO2019088689 A1 WO 2019088689A1 KR 2018013095 W KR2018013095 W KR 2018013095W WO 2019088689 A1 WO2019088689 A1 WO 2019088689A1
Authority
WO
WIPO (PCT)
Prior art keywords
local
remote
random number
quantum
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2018/013095
Other languages
French (fr)
Korean (ko)
Inventor
채령
이현규
변명현
장기형
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ROBOTEER Inc
Original Assignee
ROBOTEER Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ROBOTEER Inc filed Critical ROBOTEER Inc
Publication of WO2019088689A1 publication Critical patent/WO2019088689A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Definitions

  • the present invention relates to a PUF-QRNG quantum cryptographic security terminal system and a cryptographic key generation method which are composed of an ultra-small PUF (Phisycally Unclonable Function) chip and a QRNG (Quantum Random Number Generator).
  • a software-based random number generation technique uses a lot of resources and has a problem in that it can grasp a random number generation pattern by using an advanced hacking technique.
  • Quantum cryptography technology is based on the principle of quantum mechanics, which is the fundamental law of nature, not safety of mathematical computation. Quantum cryptography is also known as “Quantum Key Distribution Technology (QKD)" as a technique for securely real-time distribution of cryptographic keys (disposable random numbers) between a sender and a recipient based on the laws of quantum physics such as " have.
  • QKD Quantum Key Distribution Technology
  • the present invention relates to a security system that can secure a maximum security that can not be hacked by a quantum computer due to OTP (One Time Password) authentication security created by a physical object authentication PUF (Phisycally Unclonable Function) Chip and a Quantum Random Number Generator (QRNG) .
  • OTP One Time Password
  • PUF Physical object authentication
  • QRNG Quantum Random Number Generator
  • the security terminal includes a quantum random number generator and a PUF PIN data generator.
  • the PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip
  • the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number.
  • the One Time Password (OTP) authentication security generated by the physical object authentication PUF (Phisycally Unclonable Function) Chip of the present invention and the QRNG (Quantum Random Number Generator) generating a natural random number is the best security that can not be hacked by a quantum computer .
  • Unidirectional cryptographic key that transmits data only in one direction through single PIN data of non-replicable physical PUF chip and one-time OTP quantum cryptographic key using random natural number of quantum random number generators, and integrates with quantum terminal Way tunneling data communication only between servers, OTP (One Time Password) authentication security created through physical object authentication PUF Chip and QRNG generating natural random number has the highest security that can not be hacked by a quantum computer.
  • OTP One Time Password
  • the present invention has no memory burden and high processing speed due to physical security implemented in hardware.
  • FIG. 1 is a block diagram for understanding the present invention.
  • FIG. 2 is a block diagram of a security terminal according to an embodiment of the present invention.
  • FIG. 3 is a conceptual diagram for explaining a PUF according to the present invention.
  • FIG. 5 is a block diagram of a cryptographic key generation method according to the present invention.
  • FIG. 6 is a block diagram of a SoC in accordance with the present invention.
  • a PIN (Personal Identification Number) data is extracted from a PUF chip through a process deviation occurring in a semiconductor manufacturing process to generate a symmetric key (decryption key), and the symmetric key is encrypted with a random quantum random number generated through a QRNG To generate an asymmetric key (cryptographic key) and vice versa.
  • PUF generates a PIN as a circuit that generates different function values even if it is manufactured with the same design drawing by using the characteristic deviation caused by the process change.
  • the PIN may be generated using the digital value itself, rather than the digital value generated by the physical characteristics of the PUF.
  • a value obtained from an external reliable source may be used as a seed and a result value obtained by encrypting the original digital value generated by the PUF may be used as the PIN.
  • the digital value V PUF provided by the PUF is inserted into the seed and the hash function. Therefore, the finally used PIN value may be Hash (V PUF
  • the PIN when the private key is leaked by any path, the PIN can be easily changed by changing only the seed value, so that safety and convenience can be improved.
  • this PIN value generation is only a few embodiments, and the embodiments include both the case where the digital value itself generated by the PUF is used as a PIN, and the case where the value obtained by separately processing the PUF is used as a PIN.
  • the process of generating the new PIN by processing the digital value generated by the PUF will not be described in detail, but all of these embodiments should be understood.
  • the PUF has a random value that can not be predicted, so it can be used to determine the PIN of the device. If the PUF is used, it can prevent the pre-leakage of the PIN that may occur when the PUF is generated from the outside and stored in the memory.
  • the PIN value generated by the PUF is excellent in randomness, and in the embodiments, it is reliable that the value once generated does not change with time.
  • a serial number is stored in a serial number storage unit of a security terminal, the unique value of a device provided by a factory in the manufacturing process of the device, and the unique serial number of the device Input to the device via the I / O interface, and the secret key from the secret key module may be extracted to the factory or to the outside having administrative authority only once for the first time. It does not have to be once according to the policy, but it can be designated as one of security maintenance.
  • the device may be an electronic fuse (eFUSE) comprising a fuse portion.
  • eFUSE electronic fuse
  • the fuse block physically disconnects the connection between the secret key module and the I / O interface, which is irreversible. It is impossible for the subject having the management authority to safely manage the secret key extracted for the first time and it is impossible for the secret key of the device to be newly extracted after the fuse unit is cut off.
  • the apparatus and method for implementing the PUF (Physically Unclonable Function) by using the process deviation during semiconductor manufacturing and applying the method and apparatus for generating the identification key are used to enhance the security of the physical entity.
  • the PUF authenticates the physical terminal in hardware, generating an authentication request key (cryptographic key / decryption key) in which the PIN value of the PUF is generated as a one-time quantum random number OTP (One Time Password) .
  • OTP One Time Password
  • OTP One Time Password
  • PRNG pseudorandom number generator
  • a True Random Number Generator can generate a quantum random number (QRN) symmetric cryptographic key and a pseudorandom number (PRN) asymmetric cryptographic key, and a pair of symmetric cryptographic keys Way communication and authentication is possible.
  • QRN quantum random number
  • PRN pseudorandom number
  • An asymmetric cryptographic key that is re-encrypted through the pseudo-random number generator to the quantum random symmetric cryptographic key can be generated and the asymmetric cryptographic key can be decrypted through the symmetric cryptographic key.
  • the system according to the present invention includes a private key module for generating a private key to be used in a public key encryption / decryption communication method, and the private key module can provide a private key by a PUF separate from the private key module.
  • the private key generated and provided by the private key module is physically isolated from the outside and is not extracted externally from device manufacture to distribution and use.
  • the private key generated and provided by the private key module is physically isolated from the outside and is not extracted externally from device manufacture to distribution and use.
  • the device can authenticate the device through the PIN generated by itself in the object communication M2M.
  • the public key generation unit uses the private key generated by the private key module to generate a public key to be used by the device in the public key encryption / decryption communication method, and is stored in the public key storage unit.
  • the public key storage unit is a means for storing the generated public key, and may be a non-volatile memory according to an embodiment.
  • the public key storage unit can be selectively employed. In another embodiment, it is possible to read the public key generated by the public key generation unit whenever authentication is required without the public key storage unit.
  • the encryption / decryption processor can be understood as a Crypto-coprocessor for performing normal data encryption and decryption, and a configuration for exchanging actual encrypted data with the outside in the communication network is a communication interface.
  • the first extracted secret key is used only as a means of verifying that the entity is a legitimate entity when exchanging a public key with a Certification Authority (CA), which is a management entity having a proper authority to perform secure communication with the device do.
  • CA Certification Authority
  • the secret key which is already extracted once but not already used, is not directly used for encryption / decryption, but the secret key is used only in the process of sending the public key to the outside by the secret key encryption method, and double security is ensured. Therefore, the private key used for real device authentication is never exposed to the outside.
  • a Physically Unclonable Function can provide an unpredictable digital value.
  • the individual PUFs are given exact manufacturing processes, and even if they are manufactured in the same process, the digital values provided by the individual PUFs are different.
  • the PUF may be referred to as a physical one-way function (POWF) that is not replicable, and may also be referred to as a PRF (Physical Random Function).
  • PUF physical one-way function
  • PRF Physical Random Function
  • Such a PUF may be used to generate a cryptographic key for security and / or authentication.
  • a PUF can be used to provide a unique key to distinguish devices from one another.
  • a coating PUF is implemented using randomly doped particles in the top layer of the IC, and a coating PUF is generally used in a hardware chip such as a latch Butterfly PUF, which can be implemented in FPGA using process variation inside CMOS device, has also been implemented.
  • the PUF used in the present invention solves this conventional problem and can be produced at a very low unit price in the semiconductor manufacturing process while ensuring the time invariance and randomness to a very reliable level.
  • a random value is generated using the randomness due to the short circuit between the nodes existing in the semiconductor process.
  • the PUF is designed to realize the size of contacts or vias used for electrically connecting conductive layers (metal) in a semiconductor chip to a certain size or less than a design rule in the process, And whether or not a short circuit is caused to be randomly determined. That is, the PIN value is randomly generated by violating the design rule.
  • this new PUF circuit is composed of a very simple short circuit, there is no additional circuit or process and no special measuring device is needed. Since the process characteristics are used, the stability can be satisfied while maintaining the randomness of the values.
  • the vias are formed between the metal 1 layer 302 and the metal 2 layer 301 in the semiconductor manufacturing process.
  • the via size is between the group 310 and the group 330, some of the vias short-circuit the metal 1 layer 302 and the metal 2 layer 301, 302 and the metal 2 layer 301 can not be short-circuited.
  • the identification key generating unit short-circuits the metal 1 layer 302 and the metal 2 layer 301 and some of the vias are connected to the metal 1 layer 302 and the metal 2 layer 301, And the via size is set so as not to short-circuit the via.
  • the design rule for the via size differs depending on the semiconductor manufacturing process. For example, if the design rule of the via in the 0.18 um CMOS (Complementary Metal-Oxide-Semiconductor) process is set to 0.25 um, The via size is set to 0.19 ⁇ m in the generation section, so that the short circuit between the metal layers is stochastically distributed.
  • CMOS Complementary Metal-Oxide-Semiconductor
  • the secret key module and the private key module are configured by setting the via size such that the probability distribution is as close to 50% as possible.
  • This via size setting can be made by experimentation according to a specific specific semiconductor process.
  • the tamper resistance is not required for the PUF to cope with a physical attack by providing the secret key or the private key in a random and time-invariant manner.
  • Tamper-resistance which is mainly used in encryption modules to cope with physical attacks such as de-packaging, layout analysis, and memory attack, prevents the device's functions from functioning normally by deleting the contents of the memory device when attempting to release the device Protect the contents inside.
  • additional protection devices are required or the implementation means is complicated, which not only increases the cost but also has the possibility of unintentional equipment damage such as data erasure due to user's mistake or failure.
  • the PUF is implemented by the principle described above with reference to FIG. 3, there is no such problem.
  • the present invention uses a PUF, it is possible to provide a private key and a private key, which are robust against physical attacks and maintain randomness and time invariance without requiring additional cost such as tamper resistance.
  • the present invention generates a PIN that can be used as an authentication key for security authentication and is a time-invariant digital value whose value is not changed according to the surrounding environment after once generated, It is possible to prevent the security threats to the authentication scheme of the device (terminal) by adopting the quantum security technology to the security based on the PUF, so that more secure log authentication and three channel quantum security authentication technology .
  • PUF Chip is composed of System On Chip (SoC) and is composed of boot ROM, main CPU, I / O port, security MCU, SoC memory, PUF hardware pin (H / W PIN), and SPI (Serial Peripheral Interface) controller.
  • SoC System On Chip
  • I / O port I / O port
  • security MCU I / O port
  • SoC memory SoC memory
  • PUF hardware pin H / W PIN
  • SPI Serial Peripheral Interface
  • the debug interface is connected to the input / output port at the same time.
  • the system-on-chip internal programs and data can be accessed from the outside through the debugger interface. In this situation, there is no security measure to protect the data on the system on chip.
  • the security MCU operates for data security using the security key stored in the SoC memory and the security key from the unique PUF hardware pin.
  • the present invention provides a system-on-chip type PUF chip having a security function.
  • the PUF chip has an internal SoC memory access restriction, a main CPU, And to provide a system-on-chip security method that, when detected, restricting the boot ROM from booting.
  • USB Universal Serial Bus
  • a security MCU when a security MCU is additionally included in the main CPU, it is the hardware that implements the security algorithm, and takes charge of the operation portion that needs to receive control of the main CPU and process it at a high speed.
  • the main CPU judges whether or not the symmetric key or the asymmetric key generated from the random number such as the quantized random number (QRNG) and the PIN data of the PUF unique to the pseudo random number (PRNG) coincide with each other.
  • the random number such as the quantized random number (QRNG) and the PIN data of the PUF unique to the pseudo random number (PRNG) coincide with each other.
  • an apparatus for protecting an application program is provided.
  • a hacker changes a main CPU application program through a debugger interface or a serial peripheral interface bus (SPI)
  • the input / output port is shut off and the boot ROM is booted I can not.
  • SPI serial peripheral interface bus
  • PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate a symmetric key.
  • a symmetric key 1 is generated through PIN data of a PUF chip and is encrypted through a quantum random number generator (QRNG) to generate an asymmetric key 1.
  • QRNG quantum random number generator
  • the cipher text generated through the asymmetric key 1 is decrypted only through the symmetric key 1 and can be decrypted.
  • the asymmetric key 1 is re-encrypted with the pseudo random number 1 to generate the asymmetric key 2, and the asymmetric key 2 including the hash function 1 is stored in the asymmetric key 2.
  • the ciphertext generated through the asymmetric key 2 is decrypted only by the asymmetric key 1 and can be decrypted.
  • the asymmetric key 2 When the pseudo random number 2 is generated by putting the hash function 2 into the pseudo random number generator PRNG, the asymmetric key 2 is re-encrypted with the pseudo random number 2 to generate the asymmetric key 3, the asymmetric key 3 including the hash function 2, The asymmetric key 3 stores the hash functions 1 and 2, and the ciphertext (encrypted data) generated through the asymmetric key 3 is decrypted through the asymmetric key 1 or 2 to generate the n-th asymmetric key , As shown in FIG. 1, the asymmetric key 3 can be generated by encrypting the quantum random number generator with the asymmetric key 2 with the quantum random number generated through the (QRNG).
  • Differentiation occurs in decryption when generating a lower asymmetric key through a quantum random number generator and a pseudo random number generator.
  • the PUF chip-equipped security terminal can decrypt the data encrypted through the asymmetric key 1 - 3 through the asymmetric key 1 - 2 and the asymmetric key 1 - 1, the asymmetric key 1, and the symmetric key 1.
  • the pseudo-random number generating hash function of the pseudo-random number generator is stored in order, and the symmetric key 1 can decrypt all the ciphertexts generated by the asymmetric keys 1, 1-1, 1-2 and 1-3, Asymmetric key 1 can decrypt all ciphertexts created in 1-1, 1-2, and 1-3, and asymmetric key 1-1 can decrypt only ciphertexts created in 1-2, 1-3. Do.
  • the asymmetric key 2 and the asymmetric key 3 and the asymmetric key 3-1 can decrypt the ciphertext formed by the asymmetric key 3-2
  • the asymmetric key 3 is encrypted by a quantum random number (encrypted by a random quantum random number rather than a pseudo random number generated hash function), and the asymmetric key 3-1 and the asymmetric key 3-1 Key 3 can be hacked, but the asymmetric key 2 generated by the quantum random number generator is not hackable.
  • the asymmetric key generated through the quantum random number can decrypt the lower asymmetric key generated by the pseudo-random number generator, but before the asymmetric key generated through the quantum random number, only the asymmetric key generated through the quantum random number is decrypted And more can not be hacked by a quantum computer.
  • the asymmetric key becomes the symmetric key as compared with the lower asymmetric key in the newly generated order.
  • the PUF Chip is a System On Chip (SoC), which consists of a boot ROM, a central processing unit (CPU), an I / O port, a secure MCU (Machine Control Unit) PUF hardware pin (H / W PIN), and SPI (Serial Peripheral Interface) controller.
  • SoC System On Chip
  • CPU central processing unit
  • I / O port an I / O port
  • secure MCU Machine Control Unit
  • PUF hardware pin H / W PIN
  • SPI Serial Peripheral Interface
  • the CPU controls the secure MCU, boot ROM, SoC memory, I / O ports, PUF hardware pins, and SPI controller.
  • the CPU controls the secure MCU to extract PIN (Personal Identification Number) data from the PUF hardware pin, and is stored in the SoC memory and the platform memory of the high-speed quantum random number generator inside the security platform connected to the network.
  • PIN Personal Identification Number
  • the CPU controls the SPI controller to receive a quantum random number generated through a low-speed terminal random number source generator and transmits the quantum random number to the secure MCU.
  • the secure MCU generates a terminal symmetric cryptographic key using the PIN data in the SoC memory, and then generates a terminal asymmetric cryptographic key by encrypting the terminal symmetric cryptographic key with the quantum random number generated through the low-rate terminal random number source generator.
  • the quantum terminal is composed of a modem chip, a main MCU, a power amp, and a low-speed terminal quantum random number generator.
  • the low-rate terminal quantum random number generator includes a low-speed terminal random number source generator and a terminal PUF (Phisycally Unclonable Function) chip.
  • the secure MCU in the terminal PUF chip generates the terminal symmetric cryptographic key using the PIN data extracted from the PUF hardware pin and then generates the terminal asymmetric cryptographic key by encrypting the terminal symmetric cryptographic key with the quantum random number generated through the low rate terminal random number source generator And transmits the terminal symmetric cryptographic key and the terminal asymmetric cryptographic key to the main MCU in the quantum terminal.
  • the main MCU amplifies the terminal asymmetric cryptographic key and IP address data in Power Amp, and transmits the amplified data to a security platform through a modem chip.
  • the security platform transmits the terminal asymmetric cryptographic key and IP address data to the cloud server
  • the fast quantum random number generator in the secure platform comprises a high-speed random number source generator and a platform memory
  • the cloud server encrypts the high speed asymmetric cryptographic key with the terminal asymmetric cryptographic key as a modem chip of the quantum terminal IP address, and the quantum terminal decrypts the fast asymmetric cryptographic key encrypted with the terminal asymmetric cryptographic key using the terminal symmetric cryptographic key.
  • the cloud server decrypts the terminal symmetric cryptographic key with the fast symmetric cryptographic key.
  • the quantum terminal decrypts the fast symmetric cryptographic key with the terminal symmetric cryptographic key.
  • the internal low-speed local quantum random number generator comprises a low-speed local random number source generator, a local PUF (Phisycally Unclonable Function) chip and a low-speed local pseudo random number generator.
  • the PUF chip is mounted in a quantum terminal, the MCU in the quantum terminal generates unique PIN data, Stored in the platform memory;
  • the control server includes a quantum random number generator (QRNG) and a platform memory.
  • QRNG quantum random number generator
  • the control server generates a symmetric encryption key using a random random number generated through a quantum random number generator, encrypts the symmetric encryption key with PIN data stored in the platform memory To generate an asymmetric cryptographic key;
  • the control server transmits the asymmetric cryptographic key to the quantum terminal;
  • the quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server;
  • the control server connects the control server and the quantum terminal to open the bi-directional tunneling data communication when the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is decrypted with the asymmetric cryptographic key and the PIN data stored in the platform memory coincide with each other .
  • a PUF chip is mounted on a quantum terminal, and an MCU inside the quantum terminal generates unique PIN data using a physical process variation occurring during a manufacturing process And the PIN data is stored in a platform memory inside the control server;
  • the control server includes a quantum random number generator (QRNG) and a platform memory, and the control server generates a symmetric encryption key using PIN data stored in the platform memory, and the control server generates a symmetric cryptographic key using the quantum random number generated through the quantum random number generator.
  • QRNG quantum random number generator
  • the control server transmits the asymmetric cryptographic key to the quantum terminal;
  • the quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server transmits a user login (log-in) bi-directional tunneling data communication between the control server and the quantum terminal Is opened.
  • the PUF chip is mounted in a quantum terminal, the MCU in the quantum terminal generates unique PIN data, Stored in the platform memory;
  • the control server includes a pseudo random number generator and a platform memory.
  • the control server generates a random random number through a pseudo random number generator.
  • the control server generates a symmetric encryption key using PIN data stored in the platform memory.
  • the control server transmits the asymmetric cryptographic key to the quantum terminal;
  • the quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server logs in the user between the control server and the quantum terminal and transmits the bi-directional tunneling data And communication is started.
  • the remote server includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, Generates a remote symmetric encryption key with unique remote PIN data using physical process deviations occurring during the remote symmetric encryption process;
  • the remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key;
  • the remote symmetric encryption key is stored in a local server internal local memory;
  • the local server includes a local PUF chip, a local random number generator, a local memory, and a local controller.
  • the local controller generates unique local PIN data using physical process variations occurring during the manufacturing process of the local PUF chip, Generate an encryption key; Wherein the local control unit generates a random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key;
  • the local symmetric encryption key is stored in a remote server internal remote memory;
  • the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address;
  • the remote server receives the local asymmetric cryptographic key and transmits the remote cryptographic key, which is encrypted with the local asymmetric cryptographic key to the remote symmetric cryptographic key to the local server IP address, to the local server;
  • the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server Open; At the time of log-in, the local a
  • the remote server includes a remote PUF Chip, a remote random number generator, a remote memory, and a remote control unit.
  • the remote random number generator generates a remote symmetric encryption key Generate;
  • the remote control unit generates unique remote PIN data using a physical process deviation occurring during a manufacturing process of a remote PUF chip and generates a remote asymmetric encryption key by encrypting the remote symmetric encryption key;
  • the remote symmetric encryption key is stored in a local server internal local memory;
  • the local server comprises a local PUF Chip, a local random number generator, a local memory, and a local control, wherein the local random number generator generates a local symmetric encryption key;
  • the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key;
  • the local symmetric encryption key is stored in
  • the secure terminal comprises a quantum random number generator and a PUF PIN data generator
  • the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator
  • the quantum random detector detects quantum particles generated from a random number source generator that emits quantum particles
  • the quantum random pulse generator detects a quantum particle event from the quantum detection diode to detect quantum particles
  • the quantum random number control unit comprises a microprocessor for generating a random number from a random random number source generated through the quantum random pulse generator to generate a symmetric encryption key
  • the PUF PIN data generator comprises a PUF Chip and main part, and the main part is composed of PIN data of PUF chip Based features that create an asymmetric cryptographic encryption key to encrypt a symmetric encryption key that is generated by a quantum random number generator.
  • the secure terminal comprises a quantum random number generator and a PUF PIN data generator, wherein the PUF PIN data generator comprises a PUF chip and a main control unit, Generate a symmetric encryption key with the PIN data of the chip;
  • the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit, wherein the quantum detection diode detects quantum particles generated from a random number source generator emitting quantum particles, The generator generates a random pulse corresponding to the detection of the quantum particle by detecting a quantum particle event from the quantum detection diode, and the quantum random number control unit generates a quantum random number with a random random number source generated through the quantum random pulse generator; And the quantum random number control unit encrypts the symmetric cryptographic key with the quantum random number to encrypt and generate the asymmetric cryptographic key.
  • the remote USB includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, Generates a remote symmetric encryption key with unique remote PIN data using physical process deviations occurring during the remote symmetric encryption process;
  • the remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key;
  • the remote symmetric encryption key is stored in an operating server and a local USB internal local memory;
  • the local USB includes a local PUF chip, a local random number generator, a local memory, and a local controller.
  • the local controller generates unique local PIN data using physical process variations occurring during the manufacturing process of the local PUF chip, Generate an encryption key;
  • the local control unit generates a random random number through the local quantum random number generator to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key;
  • the local symmetric encryption key is stored in an operating server and a remote USB internal remote memory;
  • the operation server receives the local asymmetric encryption key and the remote asymmetric encryption key from the remote USB and local USB connected to the network, it decrypts the local symmetric encryption key and the remote symmetric encryption key,
  • the connection IP address of the local USB is transmitted through the remote USB
  • the connection IP address of the remote USB is transmitted by the local USB, so that bidirectional communication is performed through the local asymmetric encryption key and the remote asymmetric encryption key.
  • the security terminal includes a quantum random number generator and a PUF PIN data generator.
  • the PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip
  • the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number.
  • the security terminal includes a quantum random number generator and a PUF PIN data generator.
  • the quantum random number generator generates a symmetric cryptographic key with a random random number, generates a PUF PIN data generator,
  • the asymmetric cryptographic key is generated by encrypting the symmetric cryptographic key with the PIN data of the PUF chip.
  • the PUF chip generates PIN data using a physical process variation occurring in the manufacturing process to generate a symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; And generating the first asymmetric cryptographic key to the n-th asymmetric cryptographic key using a random number generated through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key.
  • the PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate the symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key;
  • the asymmetric cryptographic key generated by the pseudo random number generator includes a random number generated hash function in a newly generated asymmetric cryptographic key by generating an asymmetric cryptographic key through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key, Is stored.
  • the PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate the symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key;
  • the pseudo-random number generator generates a new pseudo-random number by generating a pseudo-random number as a random number generating hash function, and then generates a new asymmetric cryptographic key by encrypting the asymmetric cryptographic key.
  • the new asymmetric cryptographic key generated by the pseudo- And the asymmetric cryptographic key is newly stored in the asymmetric cryptographic key.
  • the Quantum Random Number Generator can be used as a True Random Number Generator (TRNG) or a Pseudo Random Number Generator (PRNG).
  • the single PIN data of the non-replicable physical PUF chip and the one-time OTP quantum cryptographic key using the random natural number of the quantum random number generator compared with the conventional security measures through a pair of VPNs, Directional tunneling data communication is opened only between the quantum terminal and the integrated control server by strengthening the security measures through application of the unidirectional cryptographic key for transmitting the data.
  • the PUF chip is mounted on the quantum terminal, And the PIN data is stored in the integrated control server internal platform memory.
  • the integrated control server comprises a quantum random number generator and a platform memory.
  • the quantum random number generator comprises a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit.
  • the random number source generator emits quantum particles
  • the quantum detection diode detects quantum particles generated from the random number source generator
  • the quantum random pulse generator detects a quantum particle event from the quantum detection diode to generate a random pulse corresponding to the detection of the quantum particle
  • the quantum random number control unit comprises a microprocessor, Generates a symmetric encryption key by generating a quantum random number from a pulse random number source, and encrypts the symmetric encryption key with PIN data stored in the platform memory to generate an asymmetric encryption key.
  • the integrated control server transmits the asymmetric cryptographic key to the MAC address of the quantum terminal modem chip, and the quantum terminal includes the modem chip, the MCU, the power amplifier, and the PUF chip.
  • the MCU receives the asymmetric cryptographic key through the modem chip
  • the power amplifier amplifies the MAC address of the modem chip and the PIN data of the PUF chip using the asymmetric cryptographic key, and transmits the amplified data to the integrated control server through the modem chip.
  • the integrated control server decrypts the data encrypted with the asymmetric cryptographic key with the symmetric cryptographic key
  • the user logs in between the integrated control server and the quantum terminal to open bi-directional tunneling data communication.
  • the quantum random number generator includes a random number source generator, a quantum detection diode, a quantum random pulse generator, a quantum random number controller, and an input / output unit.
  • the random number source generator includes a light emitting diode (LED) ), A radioisotope, a transistor noise, and a thermal noise, the quantum detection diode detects quantum particles generated from the random number source generator, and the quantum random pulse generator detects the quantum detection diode
  • the quantum random number generator generates a random number by generating a random random number from a random pulse random number source generated through the quantum random pulse generator to generate a symmetric encryption key, And a microprocessor.
  • the input / output unit includes a power supply port, an input data port, an output data port, and a grounding port.
  • the input / output unit integrates a protruding input / output unit coupled to the depressed input / output unit of the PUF PIN data generator 1 on a plate, And a protruding input / output unit including a power supply port, an input data port, an output data port, and a grounding port which are inserted into a recessed input / output unit of the quantum terminal, ; An input data port, an output data port, and a grounding port of the protruding input / output unit of the quantum random number generator; And a PUF PIN data generator 1 including an integrated housing including a PUF controller.
  • the PUF control unit When the protruding input / output unit of the PUF PIN data generator is inserted into the recessed input / output unit of the quantum terminal, the PUF control unit is powered by receiving power through a power port and a grounding port inside the quantum terminal, Output unit of the quantum random number generator is inserted into the PUF PIN data generator, the quantum random number controller is driven to receive power through the power port and the ground port in the PUF PIN data generator, and the quantum random number controller controls the random number generator A quantum detection diode, and a quantum random pulse generator, and transmits the generated symmetric cryptographic key to a PUF control unit in the PUF PIN data generator.
  • the PUF control unit controls the quantum random number generator Upon receipt of the symmetric encryption key from the random number generator, the symmetric cipher It encrypts the generated encrypt the asymmetric encryption key is characterized in that transmission to both devices.
  • the PUF controller generates a symmetric encryption key through the PIN data of the PUF chip, and the quantum random number generator generates the asymmetric encryption key by encrypting the symmetric encryption key with the quantum random number, and outputs the asymmetric encryption key to the input / output Output unit, and the input / output unit of the quantum random number generator comprises a protruding input / output unit and a depressed input / output unit.
  • VPN Virtual Private Network
  • MAC Address Media Access Control Address
  • IP Address Internet Protocol Address
  • connection server transmits the connection IP address of the remote server to the operation server connected to the network.
  • operation server connected to the network
  • the operation server transmits the connection IP address of the local server to the remote server and transmits the connection IP address of the remote server to the local server.
  • the connection IP address of the remote USB is transmitted to the operation server.
  • the operation server transmits the connection IP address of the local USB to the remote USB and transmits the connection IP address of the remote USB to the local USB.
  • the remote server When the remote server is connected to the network, the remote server transmits the connection IP address and remote PIN data of the remote server to the operation server connected to the network.
  • the local server connects to the network
  • the remote server transmits the connection IP address of the local server and the local server transmits the local IP address and the local PIN data to the connected operation server. And transmits the connection IP address of the remote server.
  • the remote server When the remote server is replaced with the remote USB and connected to the network, the remote server sends the remote USB connection IP address and remote PIN data to the operating server, and the local server replaces the local USB.
  • the remote server transmits the local IP address and local PIN data of the local USB to the operation server, and when the remote PIN data and the local PIN data are mutually user authenticated, the operation server transmits the local IP address of the local server to the remote server, And transmits the connection IP address of the remote server to the server.
  • the remote server and the local server are replaced with a USB (Universal Serial Bus) equipped with a microprocessor MCU (Micro Control Unit), the remote server is replaced with a remote USB, and the local server is replaced with a local USB .
  • USB Universal Serial Bus
  • MCU Micro Control Unit
  • the remote server can be replaced with a remote virtual private network (VPN), the local server can be replaced with a local virtual private network (VPN), and the remote server and the local server can be replaced with a microprocessor microcontroller (MCU) Board (Peripheral Component Interconnect Board), a remote server is replaced with a remote PCI board, and a local server is replaced with a local PCI board.
  • VPN virtual private network
  • MCU microprocessor microcontroller
  • MCU microcontroller
  • PCI board Peripheral Component Interconnect Board
  • USB Universal Serial Bus
  • PCI Board Peripheral Component Interconnect Board
  • a single PIN data of a non-replicable physical PUF chip and a random natural number of a quantum random number generator are compared with conventional security measures through a pair of VPNs Way tunneling data communication only between the CCTV video surveillance device and the integrated control server by enhancing the security measures by applying the one-way cryptographic key for transmitting the data only in one direction through the disposable OTP quantum cryptographic key, and the PUF chip is used for the CCTV video
  • the MCU in the CCTV video monitoring apparatus generates unique PIN data using a physical process variation occurring in the manufacturing process to generate a symmetric encryption key, and the symmetric encryption key generated through the PIN data It is stored in the internal platform memory of the integrated control server.
  • the integrated control server comprises a quantum random number generator and a platform memory
  • the quantum random number generator comprises a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number controller
  • the quantum random number generator detects a quantum particle event from the quantum detection diode to generate a random pulse corresponding to the detection of the quantum particle, and the quantum random number generator And generates a quantum random number by a random pulse random number source generated through the quantum random pulse generator.
  • the asymmetric cryptographic key is generated by encrypting the symmetric cryptographic key stored in the integrated control server internal platform memory with the quantum random number.
  • the integrated control server transmits the asymmetric cryptographic key to the MAC address of the CCTV video surveillance device, and the CCTV video surveillance device includes the modem chip, the MCU, the power amplifier, the PUF chip, and the surveillance camera.
  • the asymmetric cipher key is received, and the MAC address of the modem chip and the PIN data of the PUF chip are encrypted with the asymmetric cipher key, and the data is amplified by the power amplifier and transmitted to the integrated control server through the modem chip. If the user matches the PIN data of the PUF chip decrypted with the symmetric encryption key and the MAC address of the CCTV video monitoring device modem chip, the user logs in between the integrated control server and the CCTV video monitoring device and performs bidirectional tunneling And data communication is started.
  • a single PIN data of a non-replicable physical PUF chip and a random natural number of a quantum random number generator are compared with conventional security measures through a pair of VPNs
  • Directional cryptographic key that transmits data only in one direction through the disposable OTP quantum cryptographic key to strengthen the security measures and to open bi-directional tunneling data communication only between the CCTV video surveillance device and the integrated control server.
  • the PUF chip is mounted on the CCTV video monitoring device.
  • the MCU inside the CCTV video monitoring device generates the unique PIN data using the physical process variation occurring during the manufacturing process, and the PIN data is stored in the platform memory of the integrated control server do.
  • the integrated control server comprises a quantum random number generator and a platform memory.
  • the quantum random number generator consists of a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number controller.
  • the random number source generator emits quantum particles
  • the quantum detection diode detects quantum particles generated from the random number source generator
  • the quantum random pulse generator detects a quantum particle event from the quantum detection diode to detect quantum particles And generating a random number by generating a random random number from a random pulse random number source generated through the quantum random pulse generator to generate a symmetric encryption key
  • the integrated control server transmits the asymmetric cryptographic key to the MAC address of the CCTV video surveillance device, and the CCTV video surveillance device transmits the asymmetric cipher key to the modem chip, the MCU, the power amplifier, the PUF chip, And a surveillance camera, and the MCU receives the asymmetric cryptographic key through the modem chip and transmits the MAC Ad dress and PUF chip PIN data with the asymmetric encryption key is amplified by Power Amp and transmitted to the integrated control server through the modem chip and the integrated control server encrypts the data encrypted with the asymmetric encryption key by the symmetric encryption key
  • the user log-in is performed between
  • the remote server includes a remote PUF chip, a remote random number generator, a remote memory, a surveillance camera, and a remote control unit.
  • the remote control unit generates unique remote PIN data using a physical process variation occurring during a manufacturing process of a remote PUF chip to generate a remote symmetric encryption key and the remote control unit generates a random number through the remote random number generator, And encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key.
  • the remote PIN data is stored in the local server internal local memory.
  • the local server includes a local PUF chip, a local random number generator, a local memory, and a local control unit.
  • the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local symmetric encryption key.
  • the local control unit generates a random random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key.
  • the local PIN data is stored in a remote server internal remote memory.
  • the local server When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address.
  • the remote server receives the local asymmetric cryptographic key and transmits the remote PIN data encrypted with the local asymmetric cipher key to the local server using the local server IP address and the remote PIN data of the remote PUF chip.
  • the local server performs a log-in bi-directional operation between the local server and the remote server, Tunneling data communication is opened.
  • the remote PIN data encrypted with the local asymmetric encryption key and the local asymmetric encryption key is deleted.
  • the remote server When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server transmits the remote asymmetric encryption key to the local server IP address.
  • the local server receives the remote asymmetric cipher key and transmits the local PIN data, which is encrypted with the remote asymmetric cipher key, to the remote server using the remote server IP address and the local PIN data of the local PUF chip.
  • the remote server logs in (Log-in) between the remote server and the local server.
  • the tunneling data communication is opened and the image data is transmitted to the local server.
  • the remote asymmetric encryption key and the local PIN data encrypted with the remote asymmetric encryption key are deleted at the time of log-in.
  • a remote server includes a remote PUF chip, a remote random number generator, a remote memory, a surveillance camera, and a remote control unit.
  • the remote random number generator includes a remote PUF chip, a remote random number generator, Generates a symmetric encryption key.
  • the remote control unit generates unique remote PIN data using a physical process variation occurring during the manufacturing process of the remote PUF chip, and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key.
  • the remote symmetric encryption key is stored in a local memory inside the local server.
  • the local server includes a local PUF chip, a local random number generator, a local memory, and a local control unit.
  • the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip, and encrypts the local symmetric encryption key to generate a local asymmetric encryption key.
  • the local symmetric encryption key is stored in a remote server internal remote memory.
  • the local server When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address.
  • the remote server receives the local asymmetric cryptographic key and sends the remote cryptographic key, which is encrypted with the local symmetric cryptographic key to the remote symmetric cryptographic key, to the local server with the local server IP address.
  • the local server When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server It opens.
  • the local asymmetric encryption key and the remote encryption key are deleted.
  • the remote server When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server transmits the remote asymmetric encryption key to the local server IP address.
  • the local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server.
  • the remote server opens the log-in bi-directional tunneling data communication between the remote server and the local server And transmits the data to the local server.
  • the remote asymmetric encryption key and the local encryption key are deleted at the time of log-in.
  • the surveillance camera can be replaced with a water leakage sensor, a water meter, a heat meter, a gas meter, a wattage meter, a solar generator, a renewable energy generator, an electricity distribution panel, a broadcasting device, an automatic control panel and an automatic control server.
  • the present invention can be applied to a security system in object Internet communication. Bidirectional communication with both quantum security and PUF security is possible between any PC in the world connected to the Internet and a PC with remote USB and local USB.
  • CCTV IPTV camera water leakage sensor, water meter, heat meter, gas meter, energy meter, solar generator, renewable energy generator, switchboard, broadcasting device, automatic control panel, have.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

PIN data is generated using a physical process variation occurring during a manufacturing process of a PUF chip to generate a symmetric encryption key and an asymmetric encryption key is generated by encrypting the symmetric encryption key with a quantum random number generated through a quantum random number generator. The asymmetric cryptographic key is generated again through any one of the quantum random number generator or the pseudo-random number generator in addition to the asymmetric cryptographic key, wherein the asymmetric cryptographic key generated by the pseudo-random number generator includes a random number hash function in a newly generated asymmetric cryptographic key and is stored.

Description

PUF-QRNG 양자암호 보안단말기 시스템 및 암호키 생성 방법PUF-QRNG Quantum Cryptographic Security Terminal System and Cryptographic Key Generation Method

본 발명은 초소형의 PUF(Phisycally Unclonable Function) Chip 및 QRNG(Quantum Random Number Generator)으로 구성된 PUF-QRNG 양자암호 보안단말기 시스템 및 암호키 생성 방법에 관한 것이다.The present invention relates to a PUF-QRNG quantum cryptographic security terminal system and a cryptographic key generation method which are composed of an ultra-small PUF (Phisycally Unclonable Function) chip and a QRNG (Quantum Random Number Generator).

일반적인 소프트웨어 기반의 난수 생성 기술은 리소스를 많이 사용할 뿐 아니라 고도화된 해킹 기술을 이용하면 난수 발생 패턴을 파악할 수 있는 문제점이 있다.Generally, a software-based random number generation technique uses a lot of resources and has a problem in that it can grasp a random number generation pattern by using an advanced hacking technique.

사물인터넷 기기 간의 보안을 위하여 자연현상의 무작위성에서 난수를 추출하는 자연 난수 또는 진정 난수를 사용할 수 있다. 이러한 난수는 특정한 패턴이 없고 예측이 불가능한 장점이 있지만, 크기가 크고 매우 비싸며 추출장치가 필요해 소형화 장치에 적용하기 어려운 문제가 있다.For the security between the Internet devices, it is possible to use natural random numbers or random numbers to extract random numbers from the randomness of natural phenomena. Such a random number is advantageous in that it has no specific pattern and can not be predicted. However, the random number is large and very expensive, and it is difficult to apply it to a miniaturization apparatus because an extraction device is required.

양자암호통신(quantum cryptography) 기술은 그 안전성이 수학적인 계산 복잡성이 아닌 자연의 근본 법칙인 양자역학의 원리에 기초하므로 도청 및 감청이 매우 어려워 크게 주목 받고 있다. 양자암호통신 기술은 “양자 복제불가능성”과 같은 양자물리학의 법칙에 기초해서 송신자와 수신자 사이에 암호키(일회용 난수표)를 안전하게 실시간으로 분배하는 기술로서 "양자키 분배 기술(QKD)"로도 알려져 있다.Quantum cryptography technology is based on the principle of quantum mechanics, which is the fundamental law of nature, not safety of mathematical computation. Quantum cryptography is also known as "Quantum Key Distribution Technology (QKD)" as a technique for securely real-time distribution of cryptographic keys (disposable random numbers) between a sender and a recipient based on the laws of quantum physics such as " have.

양자암호를 송수신하기 위해서는 고가의 통신용 로컬키와 서버간의 송수신 장치가 필요하여 비용이 증가하는 문제가 있다.In order to transmit and receive a quantum cipher, there is a problem that an expensive communication local key and a transmission / reception device between the server are required and the cost increases.

본 발명은 물리적 객체인증 PUF(Phisycally Unclonable Function) Chip과 자연난수를 발생하는 QRNG(Quantum Random Number Generator)를 통해 생성한 OTP(One Time Password) 인증 보안으로 양자컴퓨터로도 해킹이 불가능한 최고의 보안성을 제공하고자 한다.The present invention relates to a security system that can secure a maximum security that can not be hacked by a quantum computer due to OTP (One Time Password) authentication security created by a physical object authentication PUF (Phisycally Unclonable Function) Chip and a Quantum Random Number Generator (QRNG) .

본 발명에 따른 PUF-QRNG 양자암호 보안단말기의 일 실시예로서, 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 대칭암호키를 생성하고, 양자난수생성기는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 한다.The security terminal includes a quantum random number generator and a PUF PIN data generator. The PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip, And the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number.

본 발명의 물리적 객체인증 PUF(Phisycally Unclonable Function) Chip과 자연난수를 발생하는 QRNG(Quantum Random Number Generator)를 통해 생성한 OTP(One Time Password) 인증 보안은 양자컴퓨터로도 해킹이 불가능한 최고의 보안성을 갖는다.The One Time Password (OTP) authentication security generated by the physical object authentication PUF (Phisycally Unclonable Function) Chip of the present invention and the QRNG (Quantum Random Number Generator) generating a natural random number is the best security that can not be hacked by a quantum computer .

복제 불가능한 물리적 PUF Chip의 단일 PIN 데이터와 양자난수생성기의 무작위 자연난수를 이용한 1회용 OTP 양자암호키를 통하여 단방향으로만 데이터를 전송하는 단방향 암호키 적용을 통해 보안대책을 강화하여 양자단말기와 통합제어서버 사이에만 양방향 터널링 데이터통신을 개통하는 것으로, 물리적 객체인증 PUF Chip과 자연난수를 발생하는 QRNG를 통해 생성한 OTP(One Time Password) 인증 보안은 양자컴퓨터로도 해킹이 불가능한 최고의 보안성을 갖는다. Unidirectional cryptographic key that transmits data only in one direction through single PIN data of non-replicable physical PUF chip and one-time OTP quantum cryptographic key using random natural number of quantum random number generators, and integrates with quantum terminal Way tunneling data communication only between servers, OTP (One Time Password) authentication security created through physical object authentication PUF Chip and QRNG generating natural random number has the highest security that can not be hacked by a quantum computer.

본 발명은 하드웨어로 구현된 물리적 보안으로 메모리 부담이 없고 처리속도가 빠르다.The present invention has no memory burden and high processing speed due to physical security implemented in hardware.

도 1은 본 발명의 이해를 위한 블록도이다.1 is a block diagram for understanding the present invention.

도 2는 본 발명에 따른 보안단말기의 일 실시예이다.2 is a block diagram of a security terminal according to an embodiment of the present invention.

도 3은 본 발명에 따른 PUF를 설명하기 위한 개념도이다.3 is a conceptual diagram for explaining a PUF according to the present invention.

도 4는 본 발명에 따른 PUF-QRNG 양자암호 보안단말기의 일 실시예이다.4 is an embodiment of a PUF-QRNG quantum cryptographic security terminal according to the present invention.

도 5는 본 발명에 따른 암호키 생성 방법의 블록도이다. 5 is a block diagram of a cryptographic key generation method according to the present invention.

도 6은 본 발명에 따른 SoC의 블록도이다.6 is a block diagram of a SoC in accordance with the present invention.

본 발명은 반도체 제조공정상 발생하는 공정편차를 통해 PUF Chip으로부터 PIN(Personal Identification Number) 데이터를 추출하여 대칭키(복호키)를 생성하고, QRNG를 통해 발생하는 무작위 양자난수를 통해 상기 대칭키를 암호화하여 비대칭키(암호키)를 생성하며 역으로도 가능하다. According to the present invention, a PIN (Personal Identification Number) data is extracted from a PUF chip through a process deviation occurring in a semiconductor manufacturing process to generate a symmetric key (decryption key), and the symmetric key is encrypted with a random quantum random number generated through a QRNG To generate an asymmetric key (cryptographic key) and vice versa.

PUF는 공정변화로 발생하는 특성 편차를 이용하여 동일 설계 도면으로 제작하더라도 서로 다른 함수 값을 발생하는 회로로서 PIN을 생성하여 제공한다. PUF generates a PIN as a circuit that generates different function values even if it is manufactured with the same design drawing by using the characteristic deviation caused by the process change.

다른 실시예로서 PUF의 물리적 특성에 의해 생성된 디지털 값 자체가 아니라 이를 이용하여 PIN을 생성할 수 있다.In another embodiment, the PIN may be generated using the digital value itself, rather than the digital value generated by the physical characteristics of the PUF.

외부의 신뢰할 수 있는 소스로부터 주어지는 값을 시드(Seed)로 하여, 상기 PUF가 생성한 오리지널 디지털 값을 암호화한 결과 값을 상기 PIN으로 할 수도 있다.A value obtained from an external reliable source may be used as a seed and a result value obtained by encrypting the original digital value generated by the PUF may be used as the PIN.

PUF가 제공하는 디지털 값 VPUF를 상기 시드(Seed)와 해시 함수에 넣는 방식을 이용한다. 따라서 최종적으로 사용되는 PIN 값은 Hash (VPUF|| Seed)일 수 있다.The digital value V PUF provided by the PUF is inserted into the seed and the hash function. Therefore, the finally used PIN value may be Hash (V PUF || Seed).

이러한 실시예에 따르면, 어떤 경로로든 개인키가 유출되는 경우 상기 시드 값만을 변경함으로써 PIN을 쉽게 변경할 수 있으므로 안전성과 편의성이 개선될 수 있다.According to this embodiment, when the private key is leaked by any path, the PIN can be easily changed by changing only the seed value, so that safety and convenience can be improved.

다만, 이러한 PIN 값 생성은 일부 실시예에 불과하며, 실시예들은 PUF가 생성한 디지털 값 자체를 PIN으로 사용하는 경우와 상기 PUF를 별도로 처리한 값을 PIN으로 사용하는 경우를 모두 포함한다. 이하에서는 PUF가 생성한 디지털 값을 처리하여 새로운 PIN을 만들어 내는 과정에 대해서 일일이 언급하지 않더라도 이러한 실시예들을 모두 포함하여 내용이 이해되어야 한다.However, this PIN value generation is only a few embodiments, and the embodiments include both the case where the digital value itself generated by the PUF is used as a PIN, and the case where the value obtained by separately processing the PUF is used as a PIN. Hereinafter, the process of generating the new PIN by processing the digital value generated by the PUF will not be described in detail, but all of these embodiments should be understood.

한편, PUF는 예측 불가능한 랜덤한 값을 갖기 때문에 장치의 PIN을 결정하는데 사용될 수 있으며, 이를 이용하면 외부에서 생성하여 주입하여 메모리에 저장할 때 발생할 수 있는 PIN의 사전 누출 문제를 방지할 수 있다.On the other hand, the PUF has a random value that can not be predicted, so it can be used to determine the PIN of the device. If the PUF is used, it can prevent the pre-leakage of the PIN that may occur when the PUF is generated from the outside and stored in the memory.

또한, PUF는 물리적으로 복제가 불가능하다는 특징을 가지고 있기 때문에 장치의 PIN 번호가 사후적으로 유출 또는 복제될 가능성도 제거할 수 있다.In addition, since the PUF is physically impossible to replicate, it is possible to eliminate the possibility that the PIN number of the device will be leaked or duplicated posteriorly.

또한, PUF가 생성하는 PIN 값은 랜덤성이 뛰어나고 실시예들에서는 한 번 생성한 값이 시간에 따라 변하지 않는 신뢰할 수 있는 것이다.Also, the PIN value generated by the PUF is excellent in randomness, and in the embodiments, it is reliable that the value once generated does not change with time.

일 실시예에 따르면, 보안단말기의 시리얼번호 저장부에는 장치의 제조 공정에서 공장(Factory)가 제공하는 기기의 고유 값이 시리얼번호(Serial number)가 저장되며, 공장으로부터 장치의 고유한 시리얼번호가 I/O 인터페이스를 통해 장치에 입력되고, 최초 1회에 한해 비밀키 모듈로부터 비밀키가 공장 또는 관리 권한을 갖는 외부로 추출될 수 있다. 정책에 따라 꼭 한 번일 필요는 없으나 보안 유지 상 한 번으로 지정될 수 있다.According to one embodiment, a serial number is stored in a serial number storage unit of a security terminal, the unique value of a device provided by a factory in the manufacturing process of the device, and the unique serial number of the device Input to the device via the I / O interface, and the secret key from the secret key module may be extracted to the factory or to the outside having administrative authority only once for the first time. It does not have to be once according to the policy, but it can be designated as one of security maintenance.

일 실시예에 따르면, 장치는 퓨즈부를 포함하는 전자퓨즈(eFUSE)일수 있다. 이러한 실시예에서 최초 1회의 비밀키 추출 이후 퓨즈부가 비밀키 모듈과 I/O 인터페이스 사이의 연결을 물리적으로 차단하며, 이는 비가역적이다. 최초 1회 추출된 비밀키는 관리 권한이 있는 주체가 안전하게 관리하면 되고, 퓨즈부의 상기 차단 이후에 새롭게 장치의 비밀키가 추출되는 것은 불가능하다. According to one embodiment, the device may be an electronic fuse (eFUSE) comprising a fuse portion. In this embodiment, after the first secret key extraction, the fuse block physically disconnects the connection between the secret key module and the I / O interface, which is irreversible. It is impossible for the subject having the management authority to safely manage the secret key extracted for the first time and it is impossible for the secret key of the device to be newly extracted after the fuse unit is cut off.

반도체 제조중 공정 편차를 이용하여 PUF(Physically Unclonable Function)를 구현하여 식별키를 생성하는 장치 및 방법을 적용하여 물리적 개체인증을 하여여 보안성을 강화한다.The apparatus and method for implementing the PUF (Physically Unclonable Function) by using the process deviation during semiconductor manufacturing and applying the method and apparatus for generating the identification key are used to enhance the security of the physical entity.

상기 PUF가 물리적인 단말기를 하드웨어적으로 인증한다면, 상기 PUF의 PIN 값을 1회성 양자난수 OTP(One Time Password)를 생성한 인증요청 키(암호키/복호키)를 생성하는 것은 양자난수생성기를 통해서 생성하는 것을 특징으로 한다. If the PUF authenticates the physical terminal in hardware, generating an authentication request key (cryptographic key / decryption key) in which the PIN value of the PUF is generated as a one-time quantum random number OTP (One Time Password) .

상기 암호키를 한 쌍의 암호키로 상호 암호통신을 위한 대칭암호키를 생성한다.And generates a symmetric cryptographic key for mutual cryptographic communication using the cryptographic key with a pair of cryptographic keys.

양자난수와는 달리 의사난수생성기(pseudorandom number generator: PRNG)를 통해 의사난수로 OTP(One Time Password) 비대칭암호키를 생성할 수 있다.Unlike quantum random numbers, it is possible to generate an OTP (One Time Password) asymmetric cryptographic key with a pseudorandom number generator (PRNG) through a pseudorandom number generator (PRNG).

또한, 순수난수생성기(True Random Number Generator: TRNG)는 양자난수(Quantum Random Number: QRN) 대칭암호키와 의사난수(pseudorandom number: PRN) 비대칭암호키를 생성할 수 있고, 한 쌍의 대칭암호키를 통해 양방향 통신 및 인증이 가능하다. In addition, a True Random Number Generator (TRNG) can generate a quantum random number (QRN) symmetric cryptographic key and a pseudorandom number (PRN) asymmetric cryptographic key, and a pair of symmetric cryptographic keys Way communication and authentication is possible.

양자난수 대칭암호키에 의사난수생성기를 통해 다시 암호화한 비대칭암호키를 생성하여 대칭암호키를 통해 비대칭암호키를 복호화할 수 있다.An asymmetric cryptographic key that is re-encrypted through the pseudo-random number generator to the quantum random symmetric cryptographic key can be generated and the asymmetric cryptographic key can be decrypted through the symmetric cryptographic key.

본 발명에 따른 시스템은 공개키 암호화/복호화 통신 방식에 사용될 개인키를 생성하는 개인키 모듈을 포함하며, 개인키 모듈은 상기 비밀키 모듈과는 별개의 PUF에 의해 개인키를 제공할 수 있다.The system according to the present invention includes a private key module for generating a private key to be used in a public key encryption / decryption communication method, and the private key module can provide a private key by a PUF separate from the private key module.

개인키 모듈이 생성 및 제공하는 개인키는 외부와는 물리적으로 고립되어 있으며, 장치 제조에서부터 유통 및 사용에 이르기까지 외부로 추출되지 않는다. 물론, 앞서 설명한 비밀키 모듈과 같은 이유에서 물리적 공격에 의한 인위적인 개인키 유출도 불가능하다.The private key generated and provided by the private key module is physically isolated from the outside and is not extracted externally from device manufacture to distribution and use. Of course, for the same reasons as the above-described secret key module, it is impossible to leak an artificial private key by a physical attack.

따라서, 개인키 모듈이 제공한 개인키의 외부 유출은 발생하지 않아 사물통신(M2M)에서 장치 스스로 생성한 PIN을 통한 기기 인증이 가능하다.Therefore, since the private key provided by the private key module does not leak, the device can authenticate the device through the PIN generated by itself in the object communication M2M.

개인키 모듈이 생성한 개인키를 이용하여 공개키 생성부는 상기 공개키 암호화/복호화 통신 방식에서 장치가 사용할 공개키(public key)를 생성하고, 이는 공개키 저장부에 저장된다. 공개키 저장부는 생성된 공개키를 저장하는 수단으로서 일 실시예에 따르면 비휘발성(non volatile) 메모리일 수 있다.Using the private key generated by the private key module, the public key generation unit generates a public key to be used by the device in the public key encryption / decryption communication method, and is stored in the public key storage unit. The public key storage unit is a means for storing the generated public key, and may be a non-volatile memory according to an embodiment.

공개키 저장부는 선택적으로 채용 가능한(employed optionally) 구성으로, 다른 실시예에서는 공개키 저장부 없이 인증이 필요한 경우마다 공개키 생성부가 생성한 공개키를 읽는 것도 가능하다.The public key storage unit can be selectively employed. In another embodiment, it is possible to read the public key generated by the public key generation unit whenever authentication is required without the public key storage unit.

암복호화 프로세서는 통상적인 데이터 암호화와 복호화를 수행하는 Crypto-coprocessor 등으로 이해될 수 있으며, 실제 암호화된 데이터를 통신 네트워크에서 외부와 주고 받는 구성은 통신 인터페이스이다.The encryption / decryption processor can be understood as a Crypto-coprocessor for performing normal data encryption and decryption, and a configuration for exchanging actual encrypted data with the outside in the communication network is a communication interface.

상기 최초 1회 추출된 비밀키는 장치와 보안 통신을 수행할 정당한 권한이 있는 관리 주체인 인증 기관(Certification Authority, CA)과 공개키를 주고 받는 경우에 서로가 정당한 개체임을 확인하는 수단으로만 사용된다.The first extracted secret key is used only as a means of verifying that the entity is a legitimate entity when exchanging a public key with a Certification Authority (CA), which is a management entity having a proper authority to perform secure communication with the device do.

즉, 최초 1회이기는 하지만 이미 추출된 바 있는 비밀키가 직접 암복호화에 사용되는 것이 아니라, 비밀키는 비밀키 암호화 방식으로 공개키를 외부에 보내는 과정에서만 사용되어, 이중의 보안이 보장된다. 따라서 실제 기기 인증에 사용되는 개인키는 외부로 절대 노출되지 않는다.That is, the secret key, which is already extracted once but not already used, is not directly used for encryption / decryption, but the secret key is used only in the process of sending the public key to the outside by the secret key encryption method, and double security is ensured. Therefore, the private key used for real device authentication is never exposed to the outside.

PUF (Physically Unclonable Function)는 예측 불가능한 (Unpredictable) 디지털 값을 제공할 수 있다. 개개의 PUF들은 정확한 제조 공정이 주어지고, 동일한 공정에서 제조되더라도 상기 개개의 PUF들이 제공하는 디지털 값은 다르다.A Physically Unclonable Function (PUF) can provide an unpredictable digital value. The individual PUFs are given exact manufacturing processes, and even if they are manufactured in the same process, the digital values provided by the individual PUFs are different.

따라서, PUF는 복제가 불가능한 POWF(Physical One-Way Function practically impossible to be duplicated)로 지칭될 수도 있고, 또한 PRF(Physical Random Function)으로 지칭될 수도 있다.Therefore, the PUF may be referred to as a physical one-way function (POWF) that is not replicable, and may also be referred to as a PRF (Physical Random Function).

이러한 PUF는 보안 및/또는 인증을 위한 암호키의 생성에 이용될 수 있다. 이를테면, 디바이스를 다른 디바이스와 구별하기 위한 유니크 키(Unique key to distinguish devices from one another)를 제공하기 위해 PUF가 이용될 수 있다.Such a PUF may be used to generate a cryptographic key for security and / or authentication. For example, a PUF can be used to provide a unique key to distinguish devices from one another.

종래에는 이러한 PUF를 구현하기 위해 IC의 최상위 레이어(top layer)에 랜덤하게 도핑(doping)된 입자를 이용하여 코팅(coating) PUF를 구현하기도 하였고, 래치(latch)와 같은 하드웨어 칩에 일반적으로 쓰이는 CMOS 소자 내부의 공정 변이를 이용하여 FPGA에서도 구현 가능한 버터플라이(butterfly) PUF 등이 구현되기도 하였다.Conventionally, to implement such a PUF, a coating PUF is implemented using randomly doped particles in the top layer of the IC, and a coating PUF is generally used in a hardware chip such as a latch Butterfly PUF, which can be implemented in FPGA using process variation inside CMOS device, has also been implemented.

PUF를 PIN 생성에 활용하는 응용이 상용화될 수 있도록 신뢰 가능하려면 PUF 회로 자체의 물리적 복제 불가능성, 생성된 PIN 값의 랜덤성 및 한 번 생성된 PIN의 값이 시간의 흐름에 따라 변화하지 않는 시불변성이 모두 보장되어야 한다.To be reliable so that the application that utilizes PUF for PIN generation can be commercialized, it is required that the physical unreproducibility of the PUF circuit itself, the randomness of the generated PIN value, and the value of the once generated PIN do not change with time All invariances must be guaranteed.

종래의 대부분의 PUF 회로들은 PUF 또는 PRF로서 충족시켜야 하는 랜덤성과 값의 시불변성 중 적어도 하나를 높은 수준으로 보장하지 못했기 때문에 상용화에 어려움이 있었다.Most conventional PUF circuits have difficulty in commercialization because they can not guarantee at least one of the randomness to be satisfied as PUF or PRF and the time invariance of value to a high level.

본 발명에 사용되는 PUF는 이러한 종래의 문제점을 해결하여 시불변성과 랜덤성을 굉장히 신뢰할 수 있는 수준으로 보장하면서도 반도체 제작 과정에서 매우 낮은 단가로 생성 가능하다.The PUF used in the present invention solves this conventional problem and can be produced at a very low unit price in the semiconductor manufacturing process while ensuring the time invariance and randomness to a very reliable level.

PUF가 생성한 PIN의 랜덤성과 시불변성을 동시에 만족하기 위해 반도체 공정에서 존재하는 노드들 사이의 단락 여부 등에 의한 무작위성을 이용하여 랜덤값을 만들어 낸다.In order to satisfy both the randomness and the time invariance of the PIN generated by the PUF, a random value is generated using the randomness due to the short circuit between the nodes existing in the semiconductor process.

PUF는 반도체 칩 내의 전도성 레이어(metal) 사이를 전기적으로 연결하기 위해 사용되는 콘택(contact) 또는 비아(via)의 크기를 공정에서 연결 여부가 확실한 크기, 즉 디자인 룰보다 작은 형태로 구현하여, 그 단락 여부가 랜덤하게 결정되게 한다. 즉, 의도적으로 디자인 룰을 위반하여 랜덤한 PIN 값을 생성하는 것이다.The PUF is designed to realize the size of contacts or vias used for electrically connecting conductive layers (metal) in a semiconductor chip to a certain size or less than a design rule in the process, And whether or not a short circuit is caused to be randomly determined. That is, the PIN value is randomly generated by violating the design rule.

이러한 새로운 PUF 회로는 매우 간단한 단락 회로로 구성되기 때문에 별도의 추가적인 회로나 공정 중의 과정이 없고, 특별한 측정 장치도 필요 없기 때문에, 쉽게 구현이 가능하다. 그리고 공정의 특성을 이용하기 때문에 값의 랜덤성을 유지하면서 안정성을 충족시킬 수 있다.Since this new PUF circuit is composed of a very simple short circuit, there is no additional circuit or process and no special measuring device is needed. Since the process characteristics are used, the stability can be satisfied while maintaining the randomness of the values.

도 3에서 도시된 바를 참조하여 실시예에 따른 PUF 생성을 구체적으로 설명한다.The generation of the PUF according to the embodiment will be described in detail with reference to FIG.

반도체 제조 공정에서 메탈 1 레이어(302)와 메탈 2 레이어(301) 사이에 비아들이 형성된 모습의 도시되었다.And the vias are formed between the metal 1 layer 302 and the metal 2 layer 301 in the semiconductor manufacturing process.

비아 사이즈를 디자인 룰에 따라 충분히 크게 한 그룹(310)에서는 모든 비아가 메탈 1 레이어(302)와 메탈 2 레이어(301)을 단락시키고 있으며, 단락 여부를 디지털 값으로 표현하면 모두 0이 된다.In the group 310 where the via size is sufficiently large according to the design rule, all the vias short-circuit the metal 1 layer 302 and the metal 2 layer 301,

한편, 비아 사이즈를 너무 작게 한 그룹(330)에서는 모든 비아가 메탈 1 레이어(302)와 메탈 2 레이어(301)을 단락시키지 못하고 있다. 따라서 단락 여부를 디지털 값으로 표현하면 모두 1이 된다.On the other hand, in the group 330 in which the via size is too small, all the vias can not short-circuit the metal 1 layer 302 and the metal 2 layer 301. Therefore, if a short circuit is represented by a digital value, it becomes 1.

비아 사이즈를 그룹(310)과 그룹(330) 사이로 한 그룹(320)에서는, 일부의 비아는 메탈 1 레이어(302)와 메탈 2 레이어(301)을 단락시키고, 다른 일부의 비아는 메탈 1 레이어(302)와 메탈 2 레이어(301)을 단락시키지 못하고 있다.In the group 320 where the via size is between the group 310 and the group 330, some of the vias short-circuit the metal 1 layer 302 and the metal 2 layer 301, 302 and the metal 2 layer 301 can not be short-circuited.

식별키 생성부는 그룹(320)와 같이, 일부의 비아는 메탈 1 레이어(302)와 메탈 2 레이어(301)을 단락시키고, 다른 일부의 비아는 메탈 1 레이어(302)와 메탈 2 레이어(301)을 단락시키지 못하도록 비아 사이즈를 설정하여 구성된다.The identification key generating unit short-circuits the metal 1 layer 302 and the metal 2 layer 301 and some of the vias are connected to the metal 1 layer 302 and the metal 2 layer 301, And the via size is set so as not to short-circuit the via.

비아 사이즈에 대한 디자인 룰은 반도체 제조 공정에 따라 상이한데, 이를테면 0.18 um의 CMOS(Complementary metal-oxide-semiconductor) 공정에서 비아의 디자인 룰이 0.25 um으로 설정된다고 하면, 상기 일 실시예에 따른 식별키 생성부에서 비아 사이즈를 0.19 um으로 설정하여, 메탈 레이어들 사이의 단락 여부가 확률적으로 분포하도록 한다.The design rule for the via size differs depending on the semiconductor manufacturing process. For example, if the design rule of the via in the 0.18 um CMOS (Complementary Metal-Oxide-Semiconductor) process is set to 0.25 um, The via size is set to 0.19 μm in the generation section, so that the short circuit between the metal layers is stochastically distributed.

이러한 단락 여부의 확률 분포는 50%의 단락 확률을 갖도록 하는 것이 이상적이며, 일 실시예에 따른 비밀키 모듈과 개인키 모듈은 상기 확률 분포가 최대한 50%에 가깝게 비아 사이즈를 설정하여 구성된다. 이러한 비아 사이즈 설정은, 구체적인 특정 반도체 공정에 따라 실험에 의하여 이루어질 수 있다.It is ideal to have a short-circuit probability of 50%, and the secret key module and the private key module according to an embodiment are configured by setting the via size such that the probability distribution is as close to 50% as possible. This via size setting can be made by experimentation according to a specific specific semiconductor process.

이러한 실시예에 의해 PUF가 비밀키 또는 개인키를 랜덤성과 시불변성이 보장되게 제공함으로써 물리적 공격에 대응하기 위한 탬퍼 저항(tamper-resistance)은 필요로 하지 않는다.According to this embodiment, the tamper resistance is not required for the PUF to cope with a physical attack by providing the secret key or the private key in a random and time-invariant manner.

디패키징, 레이아웃 분석, 메모리 공격 등의 물리적 공격에 대응하기 위해 암호화 모듈에 주로 사용되는 tamper-resistance는 장치에 대한 해제 시도 시 기억 장치의 내용 소거 등을 통해 장치의 기능을 정상적으로 동작할 수 없도록 하여 내부의 내용을 보호한다. 그러나, 부가적인 보호 장치를 필요로 하거나 구현 수단이 복잡해지므로 비용이 증가할 뿐만 아니라 사용자의 실수 또는 고장에 의해 데이터 소거 등의 의도치 않은 장비 손상의 가능성을 가지고 있다. 그런데, 상기와 같이 도 3에서 설명된 원리에 의해 PUF를 구현하면 이러한 문제점이 없다.Tamper-resistance, which is mainly used in encryption modules to cope with physical attacks such as de-packaging, layout analysis, and memory attack, prevents the device's functions from functioning normally by deleting the contents of the memory device when attempting to release the device Protect the contents inside. However, additional protection devices are required or the implementation means is complicated, which not only increases the cost but also has the possibility of unintentional equipment damage such as data erasure due to user's mistake or failure. However, if the PUF is implemented by the principle described above with reference to FIG. 3, there is no such problem.

PUF는 내부의 각 셀을 분리하여 관찰하기가 매우 어렵기 때문에 수 만개 내지 수십 만개 게이트의 칩 내부에서 PUF 셀을 골라 그 값을 관찰한다는 것은 거의 불가능에 가깝다.It is almost impossible to select a PUF cell inside a chip of tens to hundreds of thousands of gates and observe its value because it is very difficult to separate and observe each cell inside the PUF.

또한, 일부 PUF는 전원이 들어온 상태에서 동작할 때에만 값이 정해지기 때문에 물리적 공격을 위한 디패키징 등의 과정에서 칩의 일부가 손상될 경우 평소의 값과 다른 값을 갖게 되어 본래 값을 추측하기가 매우 어렵다.Also, since some PUF values are determined only when the power is turned on, when a part of the chip is damaged during the process of depacking for a physical attack or the like, the PUF has a different value from the usual value, Is very difficult.

따라서, 본 발명이 PUF를 사용하면 탬퍼 저항과 같은 추가 비용도 요구되지 않으면서, 물리적 공격에 강인한 구성을 가지면서 랜덤성과 시불변성이 유지되는 비밀키와 개인키를 제공할 수 있다.Therefore, when the present invention uses a PUF, it is possible to provide a private key and a private key, which are robust against physical attacks and maintain randomness and time invariance without requiring additional cost such as tamper resistance.

본 발명은 보안 인증을 위한 인증 키로 사용될 수 있는 PIN을 생성하고, 이 PIN은 한 번 생성된 이후 그 값이 주변 환경에 따라 변경되지 않는 시불변(Time-invariant)의 디지털 값으로 이러한 PIN은 외부로 노출되지 않으므로, 장치(단말기)의 인증 체계에 대한 보안 위협에 대한 방지가 가능한,PUF를 기반으로 하는 보안에 양자보안 기술을 적용하여보다 안전한 로그(Log) 보안인증 및 3채널 양자보안 인증 기술을 적용한 차별성을 갖는다.The present invention generates a PIN that can be used as an authentication key for security authentication and is a time-invariant digital value whose value is not changed according to the surrounding environment after once generated, It is possible to prevent the security threats to the authentication scheme of the device (terminal) by adopting the quantum security technology to the security based on the PUF, so that more secure log authentication and three channel quantum security authentication technology .

PUF Chip은 시스템 온 칩(SoC: System On Chip)으로 구성되어 부트 ROM(Boot Read Only Memory), 메인 CPU(Central Processing Unit), 입출력 포트(I/O Port), 보안 MCU(Machine Control Unit), SoC 메모리, PUF 하드웨어 핀(H/W PIN), SPI(Serial Peripheral Interface) 컨트롤러로 구성된다.PUF Chip is composed of System On Chip (SoC) and is composed of boot ROM, main CPU, I / O port, security MCU, SoC memory, PUF hardware pin (H / W PIN), and SPI (Serial Peripheral Interface) controller.

종래에 메인 CPU가 부트 ROM를 부팅하면 디버거 인터페이스(Debug interface)도 동시에 입출력 포트를 통해 연결 상태로 디버깅 동작을 하게 되어 있다. 상기 디버거 인터페이스를 통하여 외부에서 시스템 온 칩 내부 프로그램 및 데이터에 억세스 할 수 있었다. 이런 상태에서는 시스템 온 칩 내부 데이터를 보호할 수 있는 보안 대책이 없게 된다. Conventionally, when the main CPU boots the boot ROM, the debug interface is connected to the input / output port at the same time. The system-on-chip internal programs and data can be accessed from the outside through the debugger interface. In this situation, there is no security measure to protect the data on the system on chip.

한편, 보안 MCU가 SoC 메모리에 저장된 보안키와 유니크한 PUF 하드웨어 핀으로부터의 보안키를 이용하여 데이터보안을 위한 동작을 한다. On the other hand, the security MCU operates for data security using the security key stored in the SoC memory and the security key from the unique PUF hardware pin.

하지만, 이들 SoC 메모리와 PUF 하드웨어 핀은 모두 PUF Chip 내부에 구비되어 있어서, 디버거 인터페이스를 통한 외부로부터의 접근에 의하여 그 동작이나 값이 변경될 수도 있고, 메인 CPU 또는 보안 MCU의 동작 자체가 정지될 여지도 있다. However, since both the SoC memory and the PUF hardware pin are provided in the PUF chip, the operation and the value may be changed by access from the outside through the debugger interface, and the operation of the main CPU or the security MCU itself is stopped There is also room.

따라서 디버거 인터페이스가 입출력 포트를 통해 연결 상태로 디버깅 동작되는 한, 실질적인 의미의 보안은 불가능하다는 문제가 있었다.Therefore, as long as the debugger interface is debugged in a connected state through the input / output port, there is a problem that security in a practical sense is impossible.

본 발명은 상기 종래기술의 문제를 해소하기 위한 것으로서, 보안기능을 가지는 시스템 온 칩 형태의 PUF Chip으로 데이터보안 강화를 위한 목적으로 PUF Chip 내부 SoC 메모리 억세스 제한, 메인 CPU, 보안 MCU의 프로그램 변조가 검출되는 경우에는 부트 ROM이 부팅을 못하도록 작동 제한하는 시스템 온 칩의 보안방법을 제공하고자 하는 것이다. In order to solve the problems of the prior art, the present invention provides a system-on-chip type PUF chip having a security function. In order to enhance data security, the PUF chip has an internal SoC memory access restriction, a main CPU, And to provide a system-on-chip security method that, when detected, restricting the boot ROM from booting.

또한, 시스템 온 칩를 대체하여 USB(Universal Serial Bus) 또는 보드(Board) 타입으로도 구현한다.In addition, the system-on-chip is replaced with a USB (Universal Serial Bus) or board type.

도 6과 같이, 메인 CPU에 보안 MCU를 추가로 더 포함할 경우, 보안 알고리즘을 구현하는 하드웨어로서, 메인 CPU의 컨트롤을 받아서 빠른 속도로 처리해야 하는 연산부분을 담당한다. As shown in FIG. 6, when a security MCU is additionally included in the main CPU, it is the hardware that implements the security algorithm, and takes charge of the operation portion that needs to receive control of the main CPU and process it at a high speed.

상기 메인 CPU는 양자난수(QRNG), 의사난수(PRNG) 유니크한 PUF의 PIN 데이터 등 난수로부터 생성된 대칭키 또는 비대칭키의 일치 여부를 판단하고, 일치하는 경우에만 부트 ROM이 부팅되도록 한다. The main CPU judges whether or not the symmetric key or the asymmetric key generated from the random number such as the quantized random number (QRNG) and the PIN data of the PUF unique to the pseudo random number (PRNG) coincide with each other.

본 발명에서는 어플리케이션 프로그램을 보호하는 장치를 마련하여, 해커가 디버거 인터페이스 또는 직렬인터페이스 버스(SPI; Serial Peripheral Interface Bus)를 통해 메인 CPU 어플리케이션 프로그램을 변경하는 경우, 입출력 포트를 차단 및 부트 ROM이 부팅을 못하도록 한다.In the present invention, an apparatus for protecting an application program is provided. When a hacker changes a main CPU application program through a debugger interface or a serial peripheral interface bus (SPI), the input / output port is shut off and the boot ROM is booted I can not.

도 1을 참고하여 상세히 설명한다. PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭키를 생성한다.Will be described in detail with reference to FIG. PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate a symmetric key.

양자난수생성기를 통해 발생하는 양자난수로 상기 대칭키를 암호화하여 비대칭키를 생성한다.And generates the asymmetric key by encrypting the symmetric key with the quantum random number generated through the quantum random number generator.

상기 비대칭키에 양자난수생성기 또는 의사난수생성기 중 어느 하나를 통해 다시 비대칭키를 생성하되, 의사난수생성기를 통해 생성되는 비대칭키는 난수발생에 사용한 난수발생 해시(암호화)함수를 새로 생성되는 비대칭키에 포함하여 저장되는 것을 특징으로 한다.Generating an asymmetric key through the quantum random number generator or the pseudo random number generator on the asymmetric key, wherein the asymmetric key generated by the pseudo random number generator is a random number generated hash function used for random number generation, Is stored in the memory.

도 1을 참고하면, PUF Chip의 PIN 데이터를 통해 대칭키 1을 생성한 후 양자난수발생기(QRNG)를 통해서 암호화하여 비대칭키 1을 생성한다.Referring to FIG. 1, a symmetric key 1 is generated through PIN data of a PUF chip and is encrypted through a quantum random number generator (QRNG) to generate an asymmetric key 1.

상기 비대칭키 1을 통해 생성된 암호문은 대칭키 1을 통해서만 복호화되어 해독이 가능하다.The cipher text generated through the asymmetric key 1 is decrypted only through the symmetric key 1 and can be decrypted.

의사난수생성기(PRNG)에 해시함수 1을 넣어 의사난수 1을 발생하면 비대칭키 1을 의사난수 1로 다시 암호화하여 비대칭키 2를 생성하되 상기 해시함수 1을 포함하여 비대칭키 2에 저장한다.When a pseudo random number 1 is generated by putting a hash function 1 into the pseudo random number generator PRNG, the asymmetric key 1 is re-encrypted with the pseudo random number 1 to generate the asymmetric key 2, and the asymmetric key 2 including the hash function 1 is stored in the asymmetric key 2.

상기 비대칭키 2을 통해 생성된 암호문은 비대칭키 1을 통해서만 복호화되어 해독이 가능하다.The ciphertext generated through the asymmetric key 2 is decrypted only by the asymmetric key 1 and can be decrypted.

의사난수생성기(PRNG)에 해시함수 2을 넣어 의사난수 2을 발생하면 비대칭키 2을 의사난수 2로 다시 암호화하여 비대칭키 3를 생성하되 상기 해시함수 2을 포함하여 비대칭키 3에 저장하여 최종적으로 비대칭키 3은 해시함수 1, 2를 저장하여 상기 비대칭키 3을 통해 생성된 암호문(암호화 데이터)은 비대칭키 1 또는 2을 통해서 복호화되어 해독이 가능한 것으로 상기 과정을 통해 제n 비대칭키를 생성하거나, 도 1과 같이 비대칭키 2에 양자난수생성기를(QRNG)를 통해 발생하는 양자난수로 암호화하여 비대칭키 3을 생성할 수 있다.When the pseudo random number 2 is generated by putting the hash function 2 into the pseudo random number generator PRNG, the asymmetric key 2 is re-encrypted with the pseudo random number 2 to generate the asymmetric key 3, the asymmetric key 3 including the hash function 2, The asymmetric key 3 stores the hash functions 1 and 2, and the ciphertext (encrypted data) generated through the asymmetric key 3 is decrypted through the asymmetric key 1 or 2 to generate the n-th asymmetric key , As shown in FIG. 1, the asymmetric key 3 can be generated by encrypting the quantum random number generator with the asymmetric key 2 with the quantum random number generated through the (QRNG).

양자난수생성기 및 의사난수생기를 통해 하위 비대칭키를 생성함에 있어 복호화에 차별성이 발생한다.Differentiation occurs in decryption when generating a lower asymmetric key through a quantum random number generator and a pseudo random number generator.

도5 에서 PUF Chip 탑재 보안단말기는 비대칭키 1-3를 통해서 암호화된 데이터는 비대칭키 1-2 및 비대칭키 1-1 및 비대칭키 1 및 대칭키 1를 통해 복호화될 수 있다.In FIG. 5, the PUF chip-equipped security terminal can decrypt the data encrypted through the asymmetric key 1 - 3 through the asymmetric key 1 - 2 and the asymmetric key 1 - 1, the asymmetric key 1, and the symmetric key 1.

이 과정에서 의사난수생성기의 의사난수 발생 해시함수가 순서대로 저장되어 있어, 대칭키 1은 비대칭키 1, 1-1, 1-2, 1-3 각 각에서 만든 모든 암호문을 복호화할 수 있으나, 비대칭키 1은 1-1, 1-2, 1-3 각 각에서 만든 모든 암호문을 복호화할 수 있고, 같은 방법으로 비대칭키 1-1은 1-2, 1-3에서 만든 암호문만 복호화가 가능하다.In this process, the pseudo-random number generating hash function of the pseudo-random number generator is stored in order, and the symmetric key 1 can decrypt all the ciphertexts generated by the asymmetric keys 1, 1-1, 1-2 and 1-3, Asymmetric key 1 can decrypt all ciphertexts created in 1-1, 1-2, and 1-3, and asymmetric key 1-1 can decrypt only ciphertexts created in 1-2, 1-3. Do.

그러나, 도 1과 같이 PUF 탑재 보안단말기가 비대칭키 3-2를 보유하고 암호문을 만들 경우, 비대칭키 2 및 비대칭키 3 및 비대칭키 3-1은 비대칭키 3-2로 만든 암호문을 복호화할 수 있지만, 비대칭키 3는 양자난수로 암호화(의사난수 발생 해시함수가 아닌 무작위 양자난수로 암호화)되어, 비대칭키 3-2가 해킹될 경우 해시함수를 계속 디버거 해킹을 통해 비대칭키 3-1 및 비대칭키 3까지 해킹이 가능하나 양자난수발생기를 통해 생성된 비대칭키 2는 해킹이 불가능한 것을 특징으로 한다.However, as shown in FIG. 1, when the PUF-equipped security terminal holds the asymmetric key 3-2 and creates the cipher text, the asymmetric key 2 and the asymmetric key 3 and the asymmetric key 3-1 can decrypt the ciphertext formed by the asymmetric key 3-2 However, when the asymmetric key 3-2 is hacked, the asymmetric key 3 is encrypted by a quantum random number (encrypted by a random quantum random number rather than a pseudo random number generated hash function), and the asymmetric key 3-1 and the asymmetric key 3-1 Key 3 can be hacked, but the asymmetric key 2 generated by the quantum random number generator is not hackable.

즉, 양자난수를 통해 생성된 비대칭키는 이후의 의사난수생성기로 생성한 하위 비대칭키를 복호화할 수 있으나, 양자난수를 통해 생성된 비대칭키 전에 비대칭키는 양자난수를 통해 생성한 비대칭키만 복호화가 되고 그 이상은 양자컴퓨터로도 해킹이 불가능하다.That is, the asymmetric key generated through the quantum random number can decrypt the lower asymmetric key generated by the pseudo-random number generator, but before the asymmetric key generated through the quantum random number, only the asymmetric key generated through the quantum random number is decrypted And more can not be hacked by a quantum computer.

즉 PUF를 통해 추출한 최초 PIN 데이터를 생성하는 제조 공장에서 조차도 양자난수 암호화 단계 이후로는 해킹이 불가능하다.That is, even at the manufacturing plant that generates the initial PIN data extracted through the PUF, it is impossible to hack after the quantum random number encryption step.

결론적으로, PUF 제조공장에서 추출한 최초 PIN 데이터가 해킹되거나 유출되더라도 구매자(사용자)가 중간에 양자난수를 통해 자체 암호화를 한 이후에는 해킹이 불가능하다.In conclusion, even if the original PIN data extracted from the PUF manufacturing plant is hacked or leaked, it is impossible for the buyer (user) to perform hacking after self-encrypting through the quantum random number in the middle.

예를 들어 도 1에서 비대칭키 3, 3-1, 3-1, 3-2, 3-3를 생성한 후 비대칭키 2를 폐기해 버리면 제조사와 무관하게 PUF Chip 탑재 보안단말기를 인증받을 수 있게 된다.For example, if asymmetric keys 3, 3-1, 3-1, 3-2, 3-3 are generated in FIG. 1 and asymmetric key 2 is discarded, authentication of the PUF chip secure terminal can be performed regardless of the manufacturer do.

또한, 비대칭키 3과 3-1 사이를 양자난수로 암호화하여 사용이 가능하다.It is also possible to encrypt the asymmetric keys 3 and 3-1 with quantum random numbers.

신규로 생성되는 순서대로 비대칭키가 하위 비대칭키 대비 대칭키가 된다.The asymmetric key becomes the symmetric key as compared with the lower asymmetric key in the newly generated order.

PUF Chip은 시스템 온 칩(SoC; System On Chip)으로 부트 ROM(Boot Read Only Memory), CPU(Central Processing Unit), 입출력 포트(I/O Port), 보안 MCU(Machine Control Unit), SoC 메모리, PUF 하드웨어 핀(H/W PIN), SPI(Serial Peripheral Interface) 컨트롤러로 구성된다.The PUF Chip is a System On Chip (SoC), which consists of a boot ROM, a central processing unit (CPU), an I / O port, a secure MCU (Machine Control Unit) PUF hardware pin (H / W PIN), and SPI (Serial Peripheral Interface) controller.

CPU는 보안 MCU, 부트 ROM, SoC 메모리, 입출력 포트, PUF 하드웨어 핀, SPI 컨트롤러를 제어한다.The CPU controls the secure MCU, boot ROM, SoC memory, I / O ports, PUF hardware pins, and SPI controller.

상기 CPU는 보안 MCU를 제어하여 PUF 하드웨어 핀에서 PIN(Personal Identification Number) 데이터를 추출하여 SoC 메모리 및 네트워크망에 연결된 보안플랫폼 내부 고속양자난수생성기의 플랫폼 메모리에 저장된다.The CPU controls the secure MCU to extract PIN (Personal Identification Number) data from the PUF hardware pin, and is stored in the SoC memory and the platform memory of the high-speed quantum random number generator inside the security platform connected to the network.

상기 CPU는 SPI 컨트롤러를 제어하여 저속단말 난수소스발생기를 통해 발생하는 양자난수를 수신하여 보안 MCU로 전송한다.The CPU controls the SPI controller to receive a quantum random number generated through a low-speed terminal random number source generator and transmits the quantum random number to the secure MCU.

보안 MCU는 SoC 메모리에 PIN 데이터로 단말대칭암호키를 생성 후 상기 저속단말 난수소스발생기를 통해 생성한 양자난수로 단말대칭암호키를 암호화하여 단말비대칭암호키를 생성한다.The secure MCU generates a terminal symmetric cryptographic key using the PIN data in the SoC memory, and then generates a terminal asymmetric cryptographic key by encrypting the terminal symmetric cryptographic key with the quantum random number generated through the low-rate terminal random number source generator.

상기 CPU는 입출력 포트를 통해 수신하는 단말비대칭암호키로 암호화된 PIN 데이터가 수신될 경우, 단말대칭암호키로 복호화하여 SoC 메모리에 저장된 PIN 데이터로 일치할 경우 입출력포트를 통해 디버거 인터페이스를 연결하고 네트워크망 에 연결하는 것으로, 양자단말기는 Modem Chip, 메인 MCU, Power Amp, 저속단말 양자난수생성기로 구성된다.When the PIN data encrypted with the terminal asymmetric encryption key received through the input / output port is received, the CPU decrypts the encrypted PIN data using the terminal symmetric encryption key, and when the PIN data matches the PIN data stored in the SoC memory, the CPU connects the debugger interface through the input / output port, The quantum terminal is composed of a modem chip, a main MCU, a power amp, and a low-speed terminal quantum random number generator.

저속단말 양자난수생성기는 저속단말 난수소스발생기, 단말 PUF(Phisycally Unclonable Function) Chip을 포함하여 구성된다.The low-rate terminal quantum random number generator includes a low-speed terminal random number source generator and a terminal PUF (Phisycally Unclonable Function) chip.

단말 PUF Chip 내부의 보안 MCU가 PUF 하드웨어 핀에서 추출한 PIN 데이터로 단말대칭암호키를 생성 후 상기 저속단말 난수소스발생기를 통해 생성한 양자난수로 단말대칭암호키를 암호화하여 단말비대칭암호키를 생성한 단말대칭암호키 및 단말비대칭암호키를 상기 양자단말기 내부의 메인 MCU로 전송한다.The secure MCU in the terminal PUF chip generates the terminal symmetric cryptographic key using the PIN data extracted from the PUF hardware pin and then generates the terminal asymmetric cryptographic key by encrypting the terminal symmetric cryptographic key with the quantum random number generated through the low rate terminal random number source generator And transmits the terminal symmetric cryptographic key and the terminal asymmetric cryptographic key to the main MCU in the quantum terminal.

상기 메인 MCU(Micro Control Unit)는 상기 단말비대칭암호키 및 IP Address(Internet Protocol Address) 데이터를 Power Amp에서 증폭하여 Modem Chip을 통해 보안플랫폼으로 전송한다.The main MCU amplifies the terminal asymmetric cryptographic key and IP address data in Power Amp, and transmits the amplified data to a security platform through a modem chip.

상기 보안플랫폼은 상기 단말비대칭암호키 및 IP Address 데이터를 클라우드서버로 전송하고, 보안플랫폼 내부의 고속양자난수생성기는 고속난수소스발생기, 플랫폼 메모리를 포함하여 구성되어, 플랫폼 메모리에 저장된 PIN 데이터를 통해 고속대칭암호키를 생성 후 고속난수소스발생기를 통해 고속대칭암호키를 암호화하여 고속비대칭암호키를 생성하여, 고속대칭암호키 및 고속비대칭암호키를 클라우드서버로 전송한다.Wherein the security platform transmits the terminal asymmetric cryptographic key and IP address data to the cloud server, and the fast quantum random number generator in the secure platform comprises a high-speed random number source generator and a platform memory, After generating the fast symmetric encryption key, the fast symmetric encryption key is encrypted through the fast random number source generator to generate the fast asymmetric encryption key, and the fast symmetric encryption key and the asymmetric encryption key are transmitted to the cloud server.

클라우드서버는 양자단말기 IP Address의 Modem Chip으로 단말비대칭암호키로 고속비대칭암호키를 암호화하여 전송하고, 양자단말기는 단말대칭암호키를 통해 상기 단말비대칭암호키로 암호화한 고속비대칭암호키를 복호화한다.The cloud server encrypts the high speed asymmetric cryptographic key with the terminal asymmetric cryptographic key as a modem chip of the quantum terminal IP address, and the quantum terminal decrypts the fast asymmetric cryptographic key encrypted with the terminal asymmetric cryptographic key using the terminal symmetric cryptographic key.

양자단말기는 고속비대칭암호키로 암호화한 단말대칭암호키를 클라우드서버로 전송하면, 클라우드서버는 고속대칭암호키로 단말대칭암호키를 복호화한다.When the quantum terminal transmits the terminal symmetric cryptographic key encrypted with the high-speed asymmetric cryptographic key to the cloud server, the cloud server decrypts the terminal symmetric cryptographic key with the fast symmetric cryptographic key.

클라우드서버는 단말비대칭암호키로 암호화한 고속대칭암호키를 양자단말기로 전송하면, 양자단말기는 단말대칭암호키로 고속대칭암호키를 복호화한다.When the cloud server transmits a fast symmetric cryptographic key encrypted with the terminal asymmetric cryptographic key to the quantum terminal, the quantum terminal decrypts the fast symmetric cryptographic key with the terminal symmetric cryptographic key.

양자단말기에서 클라우드서버 단방향으로 데이터를 전송할 경우 고속대칭암호키로 암호화하여 전송한다.When data is transmitted from the quantum terminal to the cloud server unidirectionally, it is encrypted with a fast symmetric encryption key and transmitted.

클라우드서버에서 양자단말기 단방향으로 데이터를 전송할 경우 단말대칭암호키로 암호화하여 전송하는 고속 터널링 데이터통신을 한다.When data is transmitted from the cloud server to the quantum terminal in one direction, it performs high-speed tunneling data communication by encrypting the data with the terminal symmetric encryption key.

상기 고속 터널링 데이터통신이 끊기면 양자난수발생기에 의해 생성된 단말대칭암호키와 고속대칭암호키는 소멸되나, 상기 고속 터널링 데이터통신이 끊겨 양자난수발생기에 의해 생성된 단말대칭암호키와 고속대칭암호키가 소멸되기 전에 고속 터널링 데이터통신에 있어서, 클라우드 로컬서버는 내부의 저속로컬 양자난수생성기는 저속로컬 난수소스발생기, 로컬 PUF(Phisycally Unclonable Function) Chip, 저속로컬 의사난수생성기를 포함하여 구성된다.When the fast tunneling data communication is interrupted, the terminal symmetric cipher key and the fast symmetric cipher key generated by the quantum random number generator are lost, but the fast tunneling data communication is interrupted and the terminal symmetric cipher key generated by the quantum random number generator and the fast symmetric cipher key In the high-speed tunneling data communication before the destruction of the cloud local server, the internal low-speed local quantum random number generator comprises a low-speed local random number source generator, a local PUF (Phisycally Unclonable Function) chip and a low-speed local pseudo random number generator.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 일 실시예로서, PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 제어서버 내부의 플랫폼 메모리에 저장되며; 제어서버는 양자난수생성기(QRNG), 플랫폼 메모리를 포함하여 구성되어, 제어서버는 양자난수생성기를 통해 발생한 무작위 난수로 대칭암호키를 생성하고, 플랫폼 메모리에 저장된 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며; 제어서버는 양자단말기로 상기 비대칭암호키를 전송하며; 양자단말기는 MCU 및 PUF Chip을 포함하여 구성되어, MCU는 상기 비대칭암호키를 수신하여 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 제어서버로 전송하며; 제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 플랫폼 메모리에 저장된 PIN 데이터가 일치할 경우, 제어서버와 양자단말기 사이에 접속하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 한다. In an embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the PUF chip is mounted in a quantum terminal, the MCU in the quantum terminal generates unique PIN data, Stored in the platform memory; The control server includes a quantum random number generator (QRNG) and a platform memory. The control server generates a symmetric encryption key using a random random number generated through a quantum random number generator, encrypts the symmetric encryption key with PIN data stored in the platform memory To generate an asymmetric cryptographic key; The control server transmits the asymmetric cryptographic key to the quantum terminal; The quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; The control server connects the control server and the quantum terminal to open the bi-directional tunneling data communication when the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is decrypted with the asymmetric cryptographic key and the PIN data stored in the platform memory coincide with each other .

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 일 실시예로서, PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 제어서버 내부의 플랫폼 메모리에 저장되며; 제어서버는 양자난수생성기(QRNG), 플랫폼 메모리를 포함하여 구성되어, 제어서버는 플랫폼 메모리에 저장된 PIN 데이터로 대칭암호키를 생성하고, 제어서버는 상기 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며; 제어서버는 양자단말기로 상기 비대칭암호키를 전송하며; 양자단말기는 MCU 및 PUF Chip을 포함하여 구성되어, MCU는 상기 비대칭암호키를 수신하여 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 제어서버로 전송하며; 제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 플랫폼 메모리에 저장된 PIN 데이터가 일치할 경우, 제어서버와 양자단말기 사이에 사용자 로그인(Log-in) 양방향 터널링 데이터통신을 개통하는 것을 특징으로 한다.In an embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, a PUF chip is mounted on a quantum terminal, and an MCU inside the quantum terminal generates unique PIN data using a physical process variation occurring during a manufacturing process And the PIN data is stored in a platform memory inside the control server; The control server includes a quantum random number generator (QRNG) and a platform memory, and the control server generates a symmetric encryption key using PIN data stored in the platform memory, and the control server generates a symmetric cryptographic key using the quantum random number generated through the quantum random number generator. Encrypting the symmetric encryption key to generate an asymmetric encryption key; The control server transmits the asymmetric cryptographic key to the quantum terminal; The quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server transmits a user login (log-in) bi-directional tunneling data communication between the control server and the quantum terminal Is opened.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 일 실시예로서, PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 제어서버 내부의 플랫폼 메모리에 저장되며; 제어서버는 의사난수생성기, 플랫폼 메모리를 포함하여 구성되어, 제어서버는 의사난수생성기를 통해 무작위 난수를 생성하고, 제어서버는 플랫폼 메모리에 저장된 PIN 데이터로 대칭암호키를 생성하고, 상기 무작위 난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며; 제어서버는 양자단말기로 상기 비대칭암호키를 전송하며; 양자단말기는 MCU 및 PUF Chip을 포함하여 구성되어, MCU는 상기 비대칭암호키를 수신하여 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 제어서버로 전송하며; 제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 플랫폼 메모리에 저장된 PIN 데이터가 일치할 경우, 제어서버와 양자단말기 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 한다. In an embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the PUF chip is mounted in a quantum terminal, the MCU in the quantum terminal generates unique PIN data, Stored in the platform memory; The control server includes a pseudo random number generator and a platform memory. The control server generates a random random number through a pseudo random number generator. The control server generates a symmetric encryption key using PIN data stored in the platform memory. Encrypting the symmetric encryption key to generate an asymmetric encryption key; The control server transmits the asymmetric cryptographic key to the quantum terminal; The quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server logs in the user between the control server and the quantum terminal and transmits the bi-directional tunneling data And communication is started.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 다른 실시예로서,리모트서버는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 리모트제어부를 포함하여 구성되어, 상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터로 리모트대칭암호키를 생성하며; 상기 리모트제어부는 상기 리모트난수생성기를 통해 무작위 난수를 발생하여, 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성하며; 상기 리모트대칭암호키는 로컬서버 내부 로컬메모리에 저장되며; 로컬서버는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성되어, 상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 로컬대칭암호키를 생성하며; 상기 로컬제어부는 상기 로컬난수생성기를 통해 무작위 난수를 발생하여, 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성하며; 상기 로컬대칭암호키는 리모트서버 내부 리모트메모리에 저장되며; 리모트서버가 로컬서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)하면, 로컬서버는 리모트서버 IP Address로 로컬비대칭암호키를 전송하며; 리모트서버는 로컬비대칭암호키를 수신하여 로컬서버 IP Address로 리모트 대칭암호키를 로컬비대칭암호키로 암호화한 리모트암호키를 로컬서버로 전송하며; 로컬서버는 상기 리모트암호키를 로컬대칭암호키로 복호화한 리모트대칭암호키와 로컬메모리에 저장된 리모트대칭암호키가 일치할 경우, 로컬서버와 리모트서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며; 로그아웃(Log-in)시 로컬비대칭암호키, 리모트암호키가 삭제되며; 로컬서버가 리모트서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)할 경우, 리모트서버는 로컬서버 IP Address로 리모트비대칭암호키를 전송하며; 로컬서버는 리모트비대칭암호키를 수신하여 리모트서버 IP Address로 로컬 대칭암호키를 리모트비대칭암호키로 암호화한 로컬암호키를 리모트서버로 전송하며; 리모트서버는 상기 로컬암호키를 리모트대칭암호키로 복호화한 로컬대칭암호키와 리모트메모리에 저장된 로컬대칭암호키가 일치할 경우, 리모트서버와 로컬서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며; 로그아웃(Log-in)시 리모트비대칭암호키,로컬암호키가 삭제되는 것을 특징으로 한다.In another embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the remote server includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, Generates a remote symmetric encryption key with unique remote PIN data using physical process deviations occurring during the remote symmetric encryption process; The remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key; Wherein the remote symmetric encryption key is stored in a local server internal local memory; The local server includes a local PUF chip, a local random number generator, a local memory, and a local controller. The local controller generates unique local PIN data using physical process variations occurring during the manufacturing process of the local PUF chip, Generate an encryption key; Wherein the local control unit generates a random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key; The local symmetric encryption key is stored in a remote server internal remote memory; When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address; The remote server receives the local asymmetric cryptographic key and transmits the remote cryptographic key, which is encrypted with the local asymmetric cryptographic key to the remote symmetric cryptographic key to the local server IP address, to the local server; When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server Open; At the time of log-in, the local asymmetric encryption key and the remote encryption key are deleted; When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server sends the remote asymmetric encryption key to the local server IP address; The local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server; When the local symmetric encryption key decrypted with the remote symmetric encryption key is identical to the local symmetric encryption key stored in the remote memory, the remote server performs a log-in bi-directional tunneling data communication between the remote server and the local server Open; The remote asymmetric encryption key and the local encryption key are deleted at the time of log-in.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 다른 실시예로서, 리모트서버는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 리모트제어부를 포함하여 구성되어, 상기 리모트난수생성기는 리모트대칭암호키를 생성하며; 상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터를 생성하여 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성하며; 상기 리모트대칭암호키는 로컬서버 내부 로컬메모리에 저장되며; 로컬서버는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성되어, 상기 로컬난수생성기는 로컬대칭암호키를 생성하며; 상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성하며; 상기 로컬대칭암호키는 리모트서버 내부 리모트메모리에 저장되며; 리모트서버가 로컬서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)하면, 로컬서버는 리모트서버 IP Address로 로컬비대칭암호키를 전송하며; 리모트서버는 로컬비대칭암호키를 수신하여 로컬서버 IP Address로 리모트대칭암호키를 로컬비대칭암호키로 암호화한 리모트암호키를 로컬서버로 전송하며; 로컬서버는 상기 리모트암호키를 로컬대칭암호키로 복호화한 리모트대칭암호키와 로컬메모리에 저장된 리모트대칭암호키가 일치할 경우, 로컬서버와 리모트서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며; 로그아웃(Log-in)시 로컬비대칭암호키, 리모트암호키가 삭제되며; 로컬서버가 리모트서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)할 경우, 리모트서버는 로컬서버 IP Address로 리모트비대칭암호키를 전송하며; 로컬서버는 리모트비대칭암호키를 수신하여 리모트서버 IP Address로 로컬 대칭암호키를 리모트비대칭암호키로 암호화한 로컬암호키를 리모트서버로 전송하며; 리모트서버는 상기 로컬암호키를 리모트대칭암호키로 복호화한 로컬대칭암호키와 리모트메모리에 저장된 로컬대칭암호가 일치할 경우, 리모트서버와 로컬서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며; 로그아웃(Log-in)시 리모트비대칭암호키, 로컬암호키가 삭제되는 것을 특징으로 한다.In another embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the remote server includes a remote PUF Chip, a remote random number generator, a remote memory, and a remote control unit. The remote random number generator generates a remote symmetric encryption key Generate; Wherein the remote control unit generates unique remote PIN data using a physical process deviation occurring during a manufacturing process of a remote PUF chip and generates a remote asymmetric encryption key by encrypting the remote symmetric encryption key; Wherein the remote symmetric encryption key is stored in a local server internal local memory; Wherein the local server comprises a local PUF Chip, a local random number generator, a local memory, and a local control, wherein the local random number generator generates a local symmetric encryption key; Wherein the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key; The local symmetric encryption key is stored in a remote server internal remote memory; When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address; The remote server receives the local asymmetric cryptographic key and transmits the remote cryptographic key, which is encrypted with the local asymmetric cryptographic key to the remote symmetric cryptographic key to the local server IP address, to the local server; When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server Open; At the time of log-in, the local asymmetric encryption key and the remote encryption key are deleted; When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server sends the remote asymmetric encryption key to the local server IP address; The local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server; When the local symmetric cipher key decrypted with the remote symmetric encryption key is identical to the local symmetric encryption key stored in the remote memory, the remote server opens the log-in bi-directional tunneling data communication between the remote server and the local server ; The remote asymmetric encryption key and the local encryption key are deleted at the time of log-in.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 다른 실시예로서, 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어, 양자난수생성기는 난수소스발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성되고, 상기 양자검출 다이오드는 양자입자를 방출하는 난수소스발생기로부터 발생하는 양자입자를 검출하고, 상기 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 상기 양자난수 제어부는 상기 양자랜덤펄스 생성기를 통해 발생하는 무작위 난수소스로 양자난수를 생성하여 대칭암호키를 생성하는 마이크로프로세서로 구성되고, PUF PIN 데이터 생성기는 PUF Chip 및 주제어부로 구성되어, 주제어부는 PUF Chip의 PIN 데이터로 상기 양자난수생성기에서 생성한 대칭암호키를 암호화하여 비대칭암호키를 암호화 생성하는 것을 특징으로 한다. In another embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the secure terminal comprises a quantum random number generator and a PUF PIN data generator, wherein the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator, Wherein the quantum random detector detects quantum particles generated from a random number source generator that emits quantum particles and the quantum random pulse generator detects a quantum particle event from the quantum detection diode to detect quantum particles And the quantum random number control unit comprises a microprocessor for generating a random number from a random random number source generated through the quantum random pulse generator to generate a symmetric encryption key, and the PUF PIN data generator comprises a PUF Chip and main part, and the main part is composed of PIN data of PUF chip Based features that create an asymmetric cryptographic encryption key to encrypt a symmetric encryption key that is generated by a quantum random number generator.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 다른 실시예로서, 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어, PUF PIN 데이터 생성기는 PUF Chip 및 주제어부로 구성되어, 상기 주제어부는 PUF Chip의 PIN 데이터로 대칭암호키를 생성하며; 양자난수생성기는 난수소스발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성되고, 상기 양자검출 다이오드는 양자입자를 방출하는 난수소스발생기로부터 발생하는 양자입자를 검출하고, 상기 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 상기 양자난수 제어부는 상기 양자랜덤펄스 생성기를 통해 발생하는 무작위 난수소스로 양자난수를 생성하며; 양자난수 제어부는 상기 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 암호화 생성하는 것을 특징으로 한다.In another embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the secure terminal comprises a quantum random number generator and a PUF PIN data generator, wherein the PUF PIN data generator comprises a PUF chip and a main control unit, Generate a symmetric encryption key with the PIN data of the chip; Wherein the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit, wherein the quantum detection diode detects quantum particles generated from a random number source generator emitting quantum particles, The generator generates a random pulse corresponding to the detection of the quantum particle by detecting a quantum particle event from the quantum detection diode, and the quantum random number control unit generates a quantum random number with a random random number source generated through the quantum random pulse generator; And the quantum random number control unit encrypts the symmetric cryptographic key with the quantum random number to encrypt and generate the asymmetric cryptographic key.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기 시스템의 다른 실시예로서, 리모트 USB는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 리모트제어부를 포함하여 구성되어, 상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터로 리모트대칭암호키를 생성하며; 상기 리모트제어부는 상기 리모트난수생성기를 통해 무작위 난수를 발생하여, 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성하며; 상기 리모트대칭암호키는 운영서버 및 로컬 USB 내부 로컬메모리에 저장되며; 로컬 USB는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성되어, 상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 로컬대칭암호키를 생성하며; 상기 로컬제어부는 상기 로컬양자난수생성기를 통해 무작위 난수를 발생하여, 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성하며; 상기 로컬대칭암호키는 운영서버 및 리모트 USB 내부 리모트메모리에 저장되며; 운영서버는 네트워크망에 연결된 리모트 USB 및 로컬 USB로부터 로컬비대칭암호키 및 리모트비대칭암호키를 수신하면, 로컬대칭암호키 및 리모트대칭암호키로 복호화하여 리모트 PIN 데이터 및 로컬 PIN 데이터 사이에 서로 사용자 인증된 PIN 데이터일 경우, 리모트 USB로 로컬 USB의 접속 IP Address를 전송 및 로컬 USB로 리모트 USB의 접속 IP Address를 전송하여 로컬비대칭암호키 및 리모트비대칭암호키를 통해 양방향 통신하는 것을 특징으로 한다. In another embodiment of the PUF-QRNG quantum cryptographic security terminal system according to the present invention, the remote USB includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, Generates a remote symmetric encryption key with unique remote PIN data using physical process deviations occurring during the remote symmetric encryption process; The remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key; Wherein the remote symmetric encryption key is stored in an operating server and a local USB internal local memory; The local USB includes a local PUF chip, a local random number generator, a local memory, and a local controller. The local controller generates unique local PIN data using physical process variations occurring during the manufacturing process of the local PUF chip, Generate an encryption key; The local control unit generates a random random number through the local quantum random number generator to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key; Wherein the local symmetric encryption key is stored in an operating server and a remote USB internal remote memory; When the operation server receives the local asymmetric encryption key and the remote asymmetric encryption key from the remote USB and local USB connected to the network, it decrypts the local symmetric encryption key and the remote symmetric encryption key, In case of PIN data, the connection IP address of the local USB is transmitted through the remote USB, and the connection IP address of the remote USB is transmitted by the local USB, so that bidirectional communication is performed through the local asymmetric encryption key and the remote asymmetric encryption key.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기의 일 실시예로서, 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 대칭암호키를 생성하고, 양자난수생성기는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 한다.The security terminal includes a quantum random number generator and a PUF PIN data generator. The PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip, And the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number.

본 발명에 따른 PUF-QRNG 양자암호 보안단말기의 일 실시예로서, 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어, 양자난수생성기는 양자난수로 대칭암호키를 생성하고, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 한다.The security terminal includes a quantum random number generator and a PUF PIN data generator. The quantum random number generator generates a symmetric cryptographic key with a random random number, generates a PUF PIN data generator, The asymmetric cryptographic key is generated by encrypting the symmetric cryptographic key with the PIN data of the PUF chip.

본 발명에 따른 PUF-QRNG을 통한 암호키 생성 방법의 일 실시예로서, PUF Chip은 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭암호키를 생성하며; 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며; 상기 비대칭암호키에 양자난수생성기 또는 의사난수발생기를 통해 발생하는 난수로 제1 비대칭암호키 내지 제n 비대칭암호키를 생성하는 것을 특징으로 한다.In one embodiment of the encryption key generation method using the PUF-QRNG according to the present invention, the PUF chip generates PIN data using a physical process variation occurring in the manufacturing process to generate a symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; And generating the first asymmetric cryptographic key to the n-th asymmetric cryptographic key using a random number generated through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key.

본 발명에 따른 PUF-QRNG을 통한 암호키 생성 방법의 일 실시예로서, PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭암호키를 생성하며; 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며; 상기 비대칭암호키에 양자난수생성기 또는 의사난수생성기 중 어느 하나를 통해 다시 비대칭암호키를 생성하되, 의사난수생성기를 통해 생성되는 비대칭암호키는 난수발생 해시함수를 새로 생성되는 비대칭암호키에 포함하여 저장되는 것을 특징으로 한다. As an embodiment of the encryption key generation method using the PUF-QRNG according to the present invention, the PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate the symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; Wherein the asymmetric cryptographic key generated by the pseudo random number generator includes a random number generated hash function in a newly generated asymmetric cryptographic key by generating an asymmetric cryptographic key through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key, Is stored.

본 발명에 따른 PUF-QRNG을 통한 암호키 생성 방법의 일 실시예로서, PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭암호키를 생성하며; 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며; 의사난수생성기는 난수발생 해시함수로 의사난수를 발생하여 새로운 의사난수를 생성한 후 상기 비대칭암호키를 암호화하여 새로운 비대칭암호키를 생성하되, 의사난수생성기를 통해 생성되는 새로운 비대칭암호키는 난수발생 해시함수를 새로 생성되는 비대칭암호키에 포함하여 저장되는 것을 특징으로 한다.As an embodiment of the encryption key generation method using the PUF-QRNG according to the present invention, the PIN data is generated using the physical process variation occurring during the manufacturing process of the PUF chip to generate the symmetric encryption key; Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; The pseudo-random number generator generates a new pseudo-random number by generating a pseudo-random number as a random number generating hash function, and then generates a new asymmetric cryptographic key by encrypting the asymmetric cryptographic key. The new asymmetric cryptographic key generated by the pseudo- And the asymmetric cryptographic key is newly stored in the asymmetric cryptographic key.

본 발명에서 양자난수생성기(Quantum Random Number Generator: QRNG)는 순수난수생성기(True Random Number Generator: TRNG) 또는 의사난수생성기(Pseudo Random Number Generator: PRNG)로 사용할 수 있다.In the present invention, the Quantum Random Number Generator (QRNG) can be used as a True Random Number Generator (TRNG) or a Pseudo Random Number Generator (PRNG).

본 발명의 일 실시예로서, 한 쌍의 VPN를 통한 종래의 보안대책에 비해 복제 불가능한 물리적 PUF Chip의 단일 PIN 데이터와 양자난수생성기의 무작위 자연난수를 이용한 1회용 OTP 양자암호키를 통하여 단방향으로만 데이터를 전송하는 단방향 암호키 적용을 통해 보안대책을 강화하여 양자단말기와 통합제어서버 사이에만 양방향 터널링 데이터통신을 개통하는 것으로, PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 통합제어서버 내부 플랫폼 메모리에 저장된다.As an embodiment of the present invention, the single PIN data of the non-replicable physical PUF chip and the one-time OTP quantum cryptographic key using the random natural number of the quantum random number generator, compared with the conventional security measures through a pair of VPNs, Directional tunneling data communication is opened only between the quantum terminal and the integrated control server by strengthening the security measures through application of the unidirectional cryptographic key for transmitting the data. The PUF chip is mounted on the quantum terminal, And the PIN data is stored in the integrated control server internal platform memory.

통합제어서버는 양자난수생성기, 플랫폼 메모리를 포함하여 구성된다. The integrated control server comprises a quantum random number generator and a platform memory.

양자난수생성기는 난수소스 발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성되어, 난수소스 발생기는 양자입자를 방출하고, 양자검출 다이오드는 상기 난수소스 발생기로부터 발생하는 양자입자를 검출하고, 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 양자난수 제어부는 마이크로프로세서로 구성되어, 상기 양자랜덤펄스 생성기를 통해 발생하는 랜덤펄스 난수소스로 양자난수를 생성하여 대칭암호키를 생성하고, 플랫폼 메모리에 저장된 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성한다.The quantum random number generator comprises a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit. The random number source generator emits quantum particles, the quantum detection diode detects quantum particles generated from the random number source generator , The quantum random pulse generator detects a quantum particle event from the quantum detection diode to generate a random pulse corresponding to the detection of the quantum particle, and the quantum random number control unit comprises a microprocessor, Generates a symmetric encryption key by generating a quantum random number from a pulse random number source, and encrypts the symmetric encryption key with PIN data stored in the platform memory to generate an asymmetric encryption key.

통합제어서버는 양자단말기 Modem Chip의 MAC Address로 비대칭암호키를 전송하고, 양자단말기는 Modem Chip, MCU, Power Amp, PUF Chip을 포함하여 구성되고, MCU는 Modem Chip를 통해 비대칭암호키를 수신하여 Modem Chip의 MAC Address와 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 Power Amp에서 증폭하여 Modem Chip을 통해 통합제어서버로 전송하고, 통합제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 양자단말기 Modem Chip의 MAC Address와 일치하는 사용자일 경우, 통합제어서버와 양자단말기 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 한다.The integrated control server transmits the asymmetric cryptographic key to the MAC address of the quantum terminal modem chip, and the quantum terminal includes the modem chip, the MCU, the power amplifier, and the PUF chip. The MCU receives the asymmetric cryptographic key through the modem chip The power amplifier amplifies the MAC address of the modem chip and the PIN data of the PUF chip using the asymmetric cryptographic key, and transmits the amplified data to the integrated control server through the modem chip. The integrated control server decrypts the data encrypted with the asymmetric cryptographic key with the symmetric cryptographic key When the user agrees with the PIN data of one PUF chip and the MAC address of the quantum terminal modem chip, the user logs in between the integrated control server and the quantum terminal to open bi-directional tunneling data communication.

도 4를 참고로 설명하면, 양자난수생성기는 난수소스발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부, 입출력부로 구성되고, 난수소스발생기는 LED(Light-Emitting Diode), LD(Laser Diode), 방사선 동위원소, 트랜지스터 노이즈, 열잡음 중 어느 하나 이상으로부터 양자입자를 방출하고, 상기 양자검출 다이오드는 상기 난수소스발생기로 부터 발생하는 양자입자를 검출하고, 상기 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 상기 양자난수 제어부는 상기 양자랜덤펄스 생성기를 통해 발생하는 랜덤펄스 무작위 난수소스로 양자난수를 생성하여 대칭암호키를 생성하는 마이크로프로세서로 구성된다.4, the quantum random number generator includes a random number source generator, a quantum detection diode, a quantum random pulse generator, a quantum random number controller, and an input / output unit. The random number source generator includes a light emitting diode (LED) ), A radioisotope, a transistor noise, and a thermal noise, the quantum detection diode detects quantum particles generated from the random number source generator, and the quantum random pulse generator detects the quantum detection diode Wherein the quantum random number generator generates a random number by generating a random random number from a random pulse random number source generated through the quantum random pulse generator to generate a symmetric encryption key, And a microprocessor.

상기 입출력부는 전원포트, 입력데이터포트, 출력데이터포트, 접지포트를 포함하여 구성되어, PUF PIN 데이터 생성기(1)의 함몰형 입출력부와 결합하는 돌출형 입출력부를 플레이트(Plate)에 집적하여 PUF PIN 데이터 생성기의 함몰형 입출력부와 결합하는 하우징(Housing)으로 밀봉한 구조이고, 양자단말기의 함몰형 입출력부에 삽입하는 전원포트, 입력데이터포트, 출력데이터포트, 접지포트를 포함하는 돌출형 입출력부; 양자난수생성기의 돌출형 입출력부가 삽입되는 반대편의 함몰형 전원포트, 입력데이터포트, 출력데이터포트, 접지포트를 포함하는 함몰형 입출력부; 및 PUF 제어부를 포함하여 일체형 하우징으로 구성되는 PUF PIN 데이터 생성기(1);로 구성된다.The input / output unit includes a power supply port, an input data port, an output data port, and a grounding port. The input / output unit integrates a protruding input / output unit coupled to the depressed input / output unit of the PUF PIN data generator 1 on a plate, And a protruding input / output unit including a power supply port, an input data port, an output data port, and a grounding port which are inserted into a recessed input / output unit of the quantum terminal, ; An input data port, an output data port, and a grounding port of the protruding input / output unit of the quantum random number generator; And a PUF PIN data generator 1 including an integrated housing including a PUF controller.

PUF PIN 데이터 생성기의 돌출형 입출력부가 양자단말기의 함몰형 입출력부에 삽입되면, 양자단말기 내부의 전원포트 및 접지포트를 통해 전원공급을 받아 PUF 제어부가 구동되고, 상기 PUF PIN 데이터 생성기의 함몰형 입출력부에 양자난수생성기의 돌출형 입출력부가 삽입되면, PUF PIN 데이터 생성기 내부의 전원포트, 접지포트를 통해 전원공급을 받아 양자난수 제어부가 구동되고, 상기 양자난수 제어부는 양자난수생성기 내부의 난수소스발생기, 양자검출 다이오드, 양자랜덤펄스 생성기를 통해 생성된 양자난수를 통해 대칭암호키를 생성하여 상기 PUF PIN 데이터 생성기 내부의 PUF 제어부로 전송하고, 상기 PUF 제어부는 입력데이터포트 및 출력데이터포트를 통해 양자난수생성기로부터 대칭암호키를 수신하면, PUF Chip의 PIN 데이터를 통해 상기 대칭암호키를 암호화하여 비대칭암호키를 암호화 생성하여 양자단말기로 전송하는 것을 특징으로 한다.When the protruding input / output unit of the PUF PIN data generator is inserted into the recessed input / output unit of the quantum terminal, the PUF control unit is powered by receiving power through a power port and a grounding port inside the quantum terminal, Output unit of the quantum random number generator is inserted into the PUF PIN data generator, the quantum random number controller is driven to receive power through the power port and the ground port in the PUF PIN data generator, and the quantum random number controller controls the random number generator A quantum detection diode, and a quantum random pulse generator, and transmits the generated symmetric cryptographic key to a PUF control unit in the PUF PIN data generator. The PUF control unit controls the quantum random number generator Upon receipt of the symmetric encryption key from the random number generator, the symmetric cipher It encrypts the generated encrypt the asymmetric encryption key is characterized in that transmission to both devices.

하드웨의 구성을 반대로 하여 PUF 제어부는 PUF Chip의 PIN 데이터를 통해 대칭암호키를 생성하고,양자난수생성기는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성 및 PUF PIN 데이터 생성기의 입출력부는 돌출형 입출력부로 구성되고, 양자난수생성기의 입출력부는 돌출형 입출력부 및 함몰형 입출력부로 구성된다.The PUF controller generates a symmetric encryption key through the PIN data of the PUF chip, and the quantum random number generator generates the asymmetric encryption key by encrypting the symmetric encryption key with the quantum random number, and outputs the asymmetric encryption key to the input / output Output unit, and the input / output unit of the quantum random number generator comprises a protruding input / output unit and a depressed input / output unit.

VPN(Virtual Private Network)를 추가로 구성하여, VPN 사이에 1:1 암호화 데이터통신을 하는 것을 특징으로 한다.And a VPN (Virtual Private Network) is additionally provided to perform 1: 1 encrypted data communication between VPNs.

MAC Address(Media Access Control Address)는 IP Address(Internet Protocol Address)로 대체할 수 있다.MAC Address (Media Access Control Address) can be replaced with IP Address (Internet Protocol Address).

운영서버를 추가로 구성되어, 리모트서버가 네트워크망에 접속하면, 네트워크망에 연결된 운영서버로 리모트서버의 접속 IP Address를 전송하고, 로컬서버는 네트워크망에 접속하면, 네트워크망에 연결된 운영서버로 로컬서버의 접속 IP Address를 전송하면, 운영서버는 리모트서버로 로컬서버의 접속 IP Address를 전송 및 로컬서버로 리모트서버의 접속 IP Address를 전송하는 것을 특징으로 한다.When the remote server is connected to the network, the connection server transmits the connection IP address of the remote server to the operation server connected to the network. When the local server connects to the network, the operation server connected to the network When the connection IP address of the local server is transmitted, the operation server transmits the connection IP address of the local server to the remote server and transmits the connection IP address of the remote server to the local server.

운영서버를 추가로 구성하고 리모트서버가 리모트 USB로 대체되어 네트워크망에 접속하면, 운영서버로 리모트 USB의 접속 IP Address를 전송하고, 로컬서버는 로컬 USB로 대체되어 네트워크망에 접속하면, 운영서버로 로컬 USB의 접속 IP Address를 전송하면, 운영서버는 리모트 USB로 로컬 USB의 접속 IP Address를 전송 및 로컬 USB로 리모트 USB의 접속 IP Address를 전송하는 것을 특징으로 한다.When the remote server is connected to the network by replacing the remote server with the remote USB, the connection IP address of the remote USB is transmitted to the operation server. When the local server is replaced with the local USB and connected to the network, When the connection IP address of the local USB is transmitted, the operation server transmits the connection IP address of the local USB to the remote USB and transmits the connection IP address of the remote USB to the local USB.

운영서버를 추가로 구성하여, 리모트서버가 네트워크망에 접속하면, 네트워크망에 연결된 운영서버로 리모트서버의 접속 IP Address 및 리모트 PIN 데이터를 전송하고, 로컬서버는 네트워크망에 접속하면, 네트워크망에 연결된 운영서버로 로컬서버의 접속 IP Address 및 로컬 PIN 데이터를 전송하고, 운영서버는 리모트 PIN 데이터 및 로컬 PIN 데이터가 상호 사용자 인증된 경우, 리모트서버로 로컬서버의 접속 IP Address를 전송 및 로컬서버로 리모트서버의 접속 IP Address를 전송하는 것을 특징으로 한다.When the remote server is connected to the network, the remote server transmits the connection IP address and remote PIN data of the remote server to the operation server connected to the network. When the local server connects to the network, When the remote PIN data and the local PIN data are mutually user authenticated, the remote server transmits the connection IP address of the local server and the local server transmits the local IP address and the local PIN data to the connected operation server. And transmits the connection IP address of the remote server.

운영서버를 추가로 구성하고, 리모트서버가 리모트 USB로 대체되어 네트워크망에 접속하면, 운영서버로 리모트 USB의 접속 IP Address 및 리모트 PIN 데이터를 전송하고, 로컬서버는 로컬 USB로 대체되어 네트워크망에 접속하면, 운영서버로 로컬 USB의 접속 IP Address 및 로컬 PIN 데이터를 전송하고, 운영서버는 리모트 PIN 데이터 및 로컬 PIN 데이터가 상호 사용자 인증된 경우, 리모트서버로 로컬서버의 접속 IP Address를 전송 및 로컬서버로 리모트서버의 접속 IP Address를 전송하는 것을 특징으로 한다.When the remote server is replaced with the remote USB and connected to the network, the remote server sends the remote USB connection IP address and remote PIN data to the operating server, and the local server replaces the local USB. The remote server transmits the local IP address and local PIN data of the local USB to the operation server, and when the remote PIN data and the local PIN data are mutually user authenticated, the operation server transmits the local IP address of the local server to the remote server, And transmits the connection IP address of the remote server to the server.

리모트서버 및 로컬서버는 마이크로프로세서 MCU(Micro Control Unit)를 탑재한 USB(Universal Serial Bus)로, 리모트서버는 리모트 USB로 대체되고, 로컬서버는 로컬 USB로 대체되는 것을 특징으로 하는 것을 특징으로 한다.The remote server and the local server are replaced with a USB (Universal Serial Bus) equipped with a microprocessor MCU (Micro Control Unit), the remote server is replaced with a remote USB, and the local server is replaced with a local USB .

리모트서버는 리모트 VPN(Virtual Private Network)으로 대체할 수 있고, 로컬서버는 로컬 VPN(Virtual Private Network)으로 대체할 수 있으며, 리모트서버 및 로컬서버는 마이크로프로세서 MCU(Micro Control Unit)를 탑재한 PCI Board(Peripheral Component Interconnect Board)로, 리모트서버는 리모트 PCI Board로 대체되고, 로컬서버는 로컬 PCI Board로 대체되는 것을 특징으로 한다.The remote server can be replaced with a remote virtual private network (VPN), the local server can be replaced with a local virtual private network (VPN), and the remote server and the local server can be replaced with a microprocessor microcontroller (MCU) Board (Peripheral Component Interconnect Board), a remote server is replaced with a remote PCI board, and a local server is replaced with a local PCI board.

USB(Universal Serial Bus)는 PCI Board(Peripheral Component Interconnect Board)로 대체되는 것을 특징으로 한다.USB (Universal Serial Bus) is replaced with a PCI Board (Peripheral Component Interconnect Board).

PUF-QRNG 양자암호 보안단말기를 탑재한 CCTV 영상감시장치의 실시예로서, 한 쌍의 VPN를 통한 종래의 보안대책에 비해 복제 불가능한 물리적 PUF Chip의 단일 PIN 데이터와 양자난수생성기의 무작위 자연난수를 이용한 1회용 OTP 양자암호키를 통하여 단방향으로만 데이터를 전송하는 단방향 암호키 적용을 통해 보안대책을 강화하여 CCTV 영상감시장치와 통합제어서버 사이에만 양방향 터널링 데이터통신을 개통하는 것으로, PUF Chip은 CCTV 영상감시장치에 장착되는 것으로, CCTV 영상감시장치 내부의 MCU는 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 PIN 데이터를 생성하여 대칭암호키를 생성하고, 상기 PIN 데이터를 통해 생성한 대칭암호키는 통합제어서버 내부 플랫폼 메모리에 저장된다.As an embodiment of a CCTV video surveillance apparatus equipped with a PUF-QRNG quantum cryptographic security terminal, a single PIN data of a non-replicable physical PUF chip and a random natural number of a quantum random number generator are compared with conventional security measures through a pair of VPNs Way tunneling data communication only between the CCTV video surveillance device and the integrated control server by enhancing the security measures by applying the one-way cryptographic key for transmitting the data only in one direction through the disposable OTP quantum cryptographic key, and the PUF chip is used for the CCTV video The MCU in the CCTV video monitoring apparatus generates unique PIN data using a physical process variation occurring in the manufacturing process to generate a symmetric encryption key, and the symmetric encryption key generated through the PIN data It is stored in the internal platform memory of the integrated control server.

통합제어서버는 양자난수생성기, 플랫폼 메모리를 포함하여 구성되고, 양자난수생성기는 난수소스 발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성되어, 난수소스 발생기는 양자입자를 방출하고, 양자검출 다이오드는 상기 난수소스 발생기로부터 발생하는 양자입자를 검출하고, 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 양자난수 제어부는 마이크로프로세서로 구성되어, 상기 양자랜덤펄스 생성기를 통해 발생하는 랜덤펄스 난수소스로 양자난수를 생성한다.Wherein the integrated control server comprises a quantum random number generator and a platform memory, wherein the quantum random number generator comprises a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number controller, The quantum random number generator detects a quantum particle event from the quantum detection diode to generate a random pulse corresponding to the detection of the quantum particle, and the quantum random number generator And generates a quantum random number by a random pulse random number source generated through the quantum random pulse generator.

통합제어서버 내부 플랫폼 메모리에 저장된 상기 대칭암호키를 상기 양자난수로 암호화하여 비대칭암호키를 생성한다.The asymmetric cryptographic key is generated by encrypting the symmetric cryptographic key stored in the integrated control server internal platform memory with the quantum random number.

통합제어서버는 CCTV 영상감시장치 Modem Chip의 MAC Address로 비대칭암호키를 전송하고, CCTV 영상감시장치는 Modem Chip, MCU, Power Amp, PUF Chip, 감시카메라를 포함하여 구성되고, MCU는 Modem Chip를 통해 비대칭암호키를 수신하여 Modem Chip의 MAC Address와 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 Power Amp에서 증폭하여 Modem Chip을 통해 통합제어서버로 전송하고, 통합제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 CCTV 영상감시장치 Modem Chip의 MAC Address와 일치하는 사용자일 경우, 통합제어서버와 CCTV 영상감시장치 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 한다.The integrated control server transmits the asymmetric cryptographic key to the MAC address of the CCTV video surveillance device, and the CCTV video surveillance device includes the modem chip, the MCU, the power amplifier, the PUF chip, and the surveillance camera. The asymmetric cipher key is received, and the MAC address of the modem chip and the PIN data of the PUF chip are encrypted with the asymmetric cipher key, and the data is amplified by the power amplifier and transmitted to the integrated control server through the modem chip. If the user matches the PIN data of the PUF chip decrypted with the symmetric encryption key and the MAC address of the CCTV video monitoring device modem chip, the user logs in between the integrated control server and the CCTV video monitoring device and performs bidirectional tunneling And data communication is started.

PUF-QRNG 양자암호 보안단말기를 탑재한 CCTV 영상감시장치의 실시예로서, 한 쌍의 VPN를 통한 종래의 보안대책에 비해 복제 불가능한 물리적 PUF Chip의 단일 PIN 데이터와 양자난수생성기의 무작위 자연난수를 이용한 1회용 OTP 양자암호키를 통하여 단방향으로만 데이터를 전송하는 단방향 암호키 적용을 통해 보안대책을 강화하여 CCTV 영상감시장치와 통합제어서버 사이에만 양방향 터널링 데이터통신을 개통한다.As an embodiment of a CCTV video surveillance apparatus equipped with a PUF-QRNG quantum cryptographic security terminal, a single PIN data of a non-replicable physical PUF chip and a random natural number of a quantum random number generator are compared with conventional security measures through a pair of VPNs Directional cryptographic key that transmits data only in one direction through the disposable OTP quantum cryptographic key to strengthen the security measures and to open bi-directional tunneling data communication only between the CCTV video surveillance device and the integrated control server.

PUF Chip은 CCTV 영상감시장치에 장착되는 것으로, CCTV 영상감시장치 내부의 MCU는 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 통합제어서버 내부 플랫폼 메모리에 저장된다.The PUF chip is mounted on the CCTV video monitoring device. The MCU inside the CCTV video monitoring device generates the unique PIN data using the physical process variation occurring during the manufacturing process, and the PIN data is stored in the platform memory of the integrated control server do.

통합제어서버는 양자난수생성기, 플랫폼 메모리를 포함하여 구성된다.The integrated control server comprises a quantum random number generator and a platform memory.

양자난수생성기는 난수소스 발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성된다.The quantum random number generator consists of a random number source generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number controller.

난수소스 발생기는 양자입자를 방출하고, 양자검출 다이오드는 상기 난수소스 발생기로부터 발생하는 양자입자를 검출하고, 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 양자난수 제어부는 마이크로프로세서로 구성되어, 상기 양자랜덤펄스 생성기를 통해 발생하는 랜덤펄스 난수소스로 양자난수를 생성하여 대칭암호키를 생성하고, 플랫폼 메모리에 저장된 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며, 통합제어서버는 CCTV 영상감시장치 Modem Chip의 MAC Address로 비대칭암호키를 전송하고, CCTV 영상감시장치는 Modem Chip, MCU, Power Amp, PUF Chip, 감시카메라를 포함하여 구성되고, MCU는 Modem Chip를 통해 비대칭암호키를 수신하여 Modem Chip의 MAC Address와 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 Power Amp에서 증폭하여 Modem Chip을 통해 통합제어서버로 전송하고, 통합제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 CCTV 영상감시장치 Modem Chip의 MAC Address와 일치하는 사용자일 경우, 통합제어서버와 CCTV 영상감시장치 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 한다.The random number source generator emits quantum particles, the quantum detection diode detects quantum particles generated from the random number source generator, and the quantum random pulse generator detects a quantum particle event from the quantum detection diode to detect quantum particles And generating a random number by generating a random random number from a random pulse random number source generated through the quantum random pulse generator to generate a symmetric encryption key, The integrated control server transmits the asymmetric cryptographic key to the MAC address of the CCTV video surveillance device, and the CCTV video surveillance device transmits the asymmetric cipher key to the modem chip, the MCU, the power amplifier, the PUF chip, And a surveillance camera, and the MCU receives the asymmetric cryptographic key through the modem chip and transmits the MAC Ad dress and PUF chip PIN data with the asymmetric encryption key is amplified by Power Amp and transmitted to the integrated control server through the modem chip and the integrated control server encrypts the data encrypted with the asymmetric encryption key by the symmetric encryption key The user log-in is performed between the integrated control server and the CCTV video surveillance device to open the bi-directional tunneling data communication if the user matches the MAC address of the PIN data and the MAC address of the CCTV video surveillance apparatus modem.

PUF-QRNG 양자암호 보안단말기를 탑재한 CCTV 영상감시장치의 실시예로서, 리모트서버는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 감시카메라, 리모트제어부를 포함하여 구성된다.As an embodiment of a CCTV video surveillance apparatus equipped with a PUF-QRNG quantum cryptographic security terminal, the remote server includes a remote PUF chip, a remote random number generator, a remote memory, a surveillance camera, and a remote control unit.

상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터를 생성하여 리모트대칭암호키를 생성하고, 상기 리모트제어부는 상기 리모트난수생성기를 통해 무작위 난수를 발생하여, 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성한다.Wherein the remote control unit generates unique remote PIN data using a physical process variation occurring during a manufacturing process of a remote PUF chip to generate a remote symmetric encryption key and the remote control unit generates a random number through the remote random number generator, And encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key.

상기 리모트 PIN 데이터는 로컬서버 내부 로컬메모리에 저장된다.The remote PIN data is stored in the local server internal local memory.

로컬서버는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성된다. The local server includes a local PUF chip, a local random number generator, a local memory, and a local control unit.

상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 로컬대칭암호키를 생성한다.The local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local symmetric encryption key.

상기 로컬제어부는 상기 로컬난수생성기를 통해 무작위 난수를 발생하여, 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성한다.The local control unit generates a random random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key.

상기 로컬 PIN 데이터는 리모트서버 내부 리모트메모리에 저장된다.The local PIN data is stored in a remote server internal remote memory.

리모트서버가 로컬서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)하면, 로컬서버는 리모트서버 IP Address로 로컬비대칭암호키를 전송한다.When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address.

리모트서버는 로컬비대칭암호키를 수신하여 로컬서버 IP Address로 리모트 PUF Chip의 리모트 PIN 데이터를 로컬비대칭암호키로 암호화한 리모트 PIN 데이터를 로컬서버로 전송한다.The remote server receives the local asymmetric cryptographic key and transmits the remote PIN data encrypted with the local asymmetric cipher key to the local server using the local server IP address and the remote PIN data of the remote PUF chip.

로컬서버는 상기 로컬비대칭암호키로 암호화한 리모트 PIN 데이터를 로컬대칭암호키로 복호화한 리모트 PIN 데이터와 로컬메모리에 저장된 리모트 PIN 데이터가 일치할 경우, 로컬서버와 리모트서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통한다.If the remote PIN data decrypted by the local symmetric encryption key is identical to the remote PIN data stored in the local memory, the local server performs a log-in bi-directional operation between the local server and the remote server, Tunneling data communication is opened.

로그아웃(Log-in)시 로컬비대칭암호키, 로컬비대칭암호키로 암호화한 리모트 PIN 데이터가 삭제된다.At the time of log-in, the remote PIN data encrypted with the local asymmetric encryption key and the local asymmetric encryption key is deleted.

로컬서버가 리모트서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)할 경우, 리모트서버는 로컬서버 IP Address로 리모트비대칭암호키를 전송한다.When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server transmits the remote asymmetric encryption key to the local server IP address.

로컬서버는 리모트비대칭암호키를 수신하여 리모트서버 IP Address로 로컬 PUF Chip의 로컬 PIN 데이터를 리모트비대칭암호키로 암호화한 로컬 PIN 데이터를 리모트서버로 전송한다.The local server receives the remote asymmetric cipher key and transmits the local PIN data, which is encrypted with the remote asymmetric cipher key, to the remote server using the remote server IP address and the local PIN data of the local PUF chip.

리모트서버는 상기 리모트비대칭암호키로 암호화한 로컬 PIN 데이터를 리모트대칭암호키로 복호화한 로컬 PIN 데이터와 리모트메모리에 저장된 로컬 PIN 데이터가 일치할 경우, 리모트서버와 로컬서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하여 영상데이터를 로컬서버로 전송한다.When the local PIN data decrypted by the remote symmetric encryption key is decrypted by the remote symmetric encryption key and the local PIN data stored in the remote memory coincides with the remote symmetric encryption key, the remote server logs in (Log-in) between the remote server and the local server. The tunneling data communication is opened and the image data is transmitted to the local server.

로그아웃(Log-in)시 리모트비대칭암호키, 리모트비대칭암호키로 암호화한 로컬 PIN 데이터가 삭제되는 것을 특징으로 한다.The remote asymmetric encryption key and the local PIN data encrypted with the remote asymmetric encryption key are deleted at the time of log-in.

PUF-QRNG 양자암호 보안단말기를 탑재한 CCTV 영상감시장치의 실시예로서, 리모트서버는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 감시카메라, 리모트제어부를 포함하여 구성되어, 상기 리모트난수생성기는 리모트대칭암호키를 생성한다.A remote server includes a remote PUF chip, a remote random number generator, a remote memory, a surveillance camera, and a remote control unit. The remote random number generator includes a remote PUF chip, a remote random number generator, Generates a symmetric encryption key.

상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터를 생성하여 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성한다.The remote control unit generates unique remote PIN data using a physical process variation occurring during the manufacturing process of the remote PUF chip, and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key.

상기 리모트대칭암호키는 로컬서버 내부 로컬메모리에 저장된다.The remote symmetric encryption key is stored in a local memory inside the local server.

로컬서버는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성된다.The local server includes a local PUF chip, a local random number generator, a local memory, and a local control unit.

상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성한다.The local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip, and encrypts the local symmetric encryption key to generate a local asymmetric encryption key.

상기 로컬대칭암호키는 리모트서버 내부 리모트메모리에 저장된다.The local symmetric encryption key is stored in a remote server internal remote memory.

리모트서버가 로컬서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)하면, 로컬서버는 리모트서버 IP Address로 로컬비대칭암호키를 전송한다.When the remote server logs in to the bidirectional tunneling data communication request to the local server, the local server sends the local asymmetric encryption key to the remote server IP address.

리모트서버는 로컬비대칭암호키를 수신하여 로컬서버 IP Address로 리모트대칭암호키를 로컬비대칭암호키로 암호화한 리모트암호키를 로컬서버로 전송한다.The remote server receives the local asymmetric cryptographic key and sends the remote cryptographic key, which is encrypted with the local symmetric cryptographic key to the remote symmetric cryptographic key, to the local server with the local server IP address.

로컬서버는 상기 리모트암호키를 로컬대칭암호키로 복호화한 리모트대칭암호키와 로컬메모리에 저장된 리모트대칭암호키가 일치할 경우, 로컬서버와 리모트서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통한다.When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server It opens.

로그아웃(Log-in)시 로컬비대칭암호키, 리모트암호키가 삭제된다.At the time of log-in, the local asymmetric encryption key and the remote encryption key are deleted.

로컬서버가 리모트서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)할 경우, 리모트서버는 로컬서버 IP Address로 리모트비대칭암호키를 전송한다.When the local server logs in to the remote server in a bidirectional tunneling data communication request, the remote server transmits the remote asymmetric encryption key to the local server IP address.

로컬서버는 리모트비대칭암호키를 수신하여 리모트서버 IP Address로 로컬 대칭암호키를 리모트비대칭암호키로 암호화한 로컬암호키를 리모트서버로 전송한다.The local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server.

리모트서버는 상기 로컬암호키를 리모트대칭암호키로 복호화한 로컬대칭암호키와 리모트메모리에 저장된 로컬대칭암호가 일치할 경우, 리모트서버와 로컬서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하여 데이터를 로컬서버로 전송한다.When the local symmetric cipher key decrypted with the remote symmetric encryption key is identical to the local symmetric encryption key stored in the remote memory, the remote server opens the log-in bi-directional tunneling data communication between the remote server and the local server And transmits the data to the local server.

로그아웃(Log-in)시 리모트비대칭암호키, 로컬암호키가 삭제되는 것을 특징으로 한다.The remote asymmetric encryption key and the local encryption key are deleted at the time of log-in.

상기 감시카메라는 누수검지센서, 수도계량기, 열검침기, 가스검침기, 전력량검침기, 태양광 발전기, 신재생에너지 발전기, 배전반, 방송장치, 자동제어반, 자동제어 서버 등으로 대체하여 적용할 수 있다. The surveillance camera can be replaced with a water leakage sensor, a water meter, a heat meter, a gas meter, a wattage meter, a solar generator, a renewable energy generator, an electricity distribution panel, a broadcasting device, an automatic control panel and an automatic control server.

본 발명은 사물 인터넷 통신에서 보안시스템으로 적용할 수 있다. 인터넷에 연결된 전 세계 어느 PC에서도 리모트 USB와 로컬 USB가 꽂힌 PC 사이에는 양자보안과 PUF 보안이 적용된 양방향 통신이 가능하다.The present invention can be applied to a security system in object Internet communication. Bidirectional communication with both quantum security and PUF security is possible between any PC in the world connected to the Internet and a PC with remote USB and local USB.

특히, 보안이 취약한 CCTV의 IP 카메라, 누수검지센서, 수도계량기, 열검침기, 가스검침기, 전력량검침기, 태양광 발전기, 신재생에너지 발전기, 배전반, 방송장치, 자동제어반, 자동제어 서버 등에 적용할 수 있다.Especially, it can be applied to CCTV IPTV camera, water leakage sensor, water meter, heat meter, gas meter, energy meter, solar generator, renewable energy generator, switchboard, broadcasting device, automatic control panel, have.

Claims (15)

PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 제어서버 내부의 플랫폼 메모리에 저장되며;The PUF chip is installed in the quantum terminal, and the MCU inside the quantum terminal generates unique PIN data, and the PIN data is stored in the platform memory inside the control server; 제어서버는 양자난수생성기(QRNG), 플랫폼 메모리를 포함하여 구성되어, The control server comprises a quantum random number generator (QRNG) and a platform memory, 제어서버는 양자난수생성기를 통해 발생한 무작위 난수로 대칭암호키를 생성하고, 플랫폼 메모리에 저장된 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며;The control server generates a symmetric cryptographic key with a random random number generated through the quantum random number generator and encrypts the symmetric cryptographic key with the PIN data stored in the platform memory to generate an asymmetric cryptographic key; 제어서버는 양자단말기로 상기 비대칭암호키를 전송하며;The control server transmits the asymmetric cryptographic key to the quantum terminal; 양자단말기는 MCU 및 PUF Chip을 포함하여 구성되어, MCU는 상기 비대칭암호키를 수신하여 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 제어서버로 전송하며;The quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; 제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 플랫폼 메모리에 저장된 PIN 데이터가 일치할 경우, 제어서버와 양자단말기 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server logs in the user between the control server and the quantum terminal and transmits the bi-directional tunneling data And the PUF-QRNG quantum cryptographic security terminal system. PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 제어서버 내부의 플랫폼 메모리에 저장되며;The PUF chip is mounted on the quantum terminal, and the MCU inside the quantum terminal generates the unique PIN data using the physical process variation occurring during the manufacturing process, and the PIN data is stored in the platform memory inside the control server; 제어서버는 양자난수생성기(QRNG), 플랫폼 메모리를 포함하여 구성되어, The control server comprises a quantum random number generator (QRNG) and a platform memory, 제어서버는 플랫폼 메모리에 저장된 PIN 데이터로 대칭암호키를 생성하고, The control server generates a symmetric encryption key with the PIN data stored in the platform memory, 제어서버는 상기 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며;The control server encrypts the symmetric cryptographic key with a quantum random number generated through the quantum random number generator to generate an asymmetric cryptographic key; 제어서버는 양자단말기로 상기 비대칭암호키를 전송하며;The control server transmits the asymmetric cryptographic key to the quantum terminal; 양자단말기는 MCU 및 PUF Chip을 포함하여 구성되어, MCU는 상기 비대칭암호키를 수신하여 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 제어서버로 전송하며;The quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; 제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 플랫폼 메모리에 저장된 PIN 데이터가 일치할 경우, 제어서버와 양자단말기 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server logs in the user between the control server and the quantum terminal and transmits the bi-directional tunneling data And the PUF-QRNG quantum cryptographic security terminal system. PUF Chip은 양자단말기에 장착되는 것으로, 양자단말기 내부의 MCU는 고유의 PIN 데이터를 생성하고, 상기 PIN 데이터는 제어서버 내부의 플랫폼 메모리에 저장되며;The PUF chip is installed in the quantum terminal, and the MCU inside the quantum terminal generates unique PIN data, and the PIN data is stored in the platform memory inside the control server; 제어서버는 의사난수생성기, 플랫폼 메모리를 포함하여 구성되어, The control server comprises a pseudo-random number generator and a platform memory, 제어서버는 의사난수생성기를 통해 무작위 난수를 생성하고, The control server generates a random number through a pseudo-random number generator, 제어서버는 플랫폼 메모리에 저장된 PIN 데이터로 대칭암호키를 생성하고, 상기 무작위 난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며;The control server generates a symmetric cryptographic key using the PIN data stored in the platform memory and encrypts the symmetric cryptographic key with the random random number to generate an asymmetric cryptographic key; 제어서버는 양자단말기로 상기 비대칭암호키를 전송하며;The control server transmits the asymmetric cryptographic key to the quantum terminal; 양자단말기는 MCU 및 PUF Chip을 포함하여 구성되어, MCU는 상기 비대칭암호키를 수신하여 PUF Chip의 PIN 데이터를 비대칭암호키로 암호화한 데이터를 제어서버로 전송하며;The quantum terminal includes an MCU and a PUF chip, and the MCU receives the asymmetric cryptographic key and transmits data obtained by encrypting the PIN data of the PUF chip with the asymmetric cryptographic key to the control server; 제어서버는 비대칭암호키로 암호화한 데이터를 대칭암호키로 복호화한 PUF Chip의 PIN 데이터와 플랫폼 메모리에 저장된 PIN 데이터가 일치할 경우, 제어서버와 양자단말기 사이에 사용자 로그인(Log-in)하여 양방향 터널링 데이터통신을 개통하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.If the PIN data of the PUF chip decrypted with the asymmetric cryptographic key is identical to the PIN data stored in the platform memory, the control server logs in the user between the control server and the quantum terminal and transmits the bi-directional tunneling data And the PUF-QRNG quantum cryptographic security terminal system. 리모트서버는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 리모트제어부를 포함하여 구성되어,The remote server includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, 상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터로 리모트대칭암호키를 생성하며;Wherein the remote control unit generates a remote symmetric encryption key using unique remote PIN data using a physical process variation occurring during the manufacturing process of the remote PUF chip; 상기 리모트제어부는 상기 리모트난수생성기를 통해 무작위 난수를 발생하여, 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성하며; The remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key; 상기 리모트대칭암호키는 로컬서버 내부 로컬메모리에 저장되며;Wherein the remote symmetric encryption key is stored in a local server internal local memory; 로컬서버는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성되어, The local server includes a local PUF chip, a local random number generator, a local memory, and a local controller, 상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 로컬대칭암호키를 생성하며;The local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local symmetric encryption key; 상기 로컬제어부는 상기 로컬난수생성기를 통해 무작위 난수를 발생하여, 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성하며; Wherein the local control unit generates a random number through the local random number generator and encrypts the local symmetric encryption key to generate a local asymmetric encryption key; 상기 로컬대칭암호키는 리모트서버 내부 리모트메모리에 저장되며;The local symmetric encryption key is stored in a remote server internal remote memory; 리모트서버가 로컬서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)하면,When the remote server logs in to the local server requesting bi-directional tunneling data communication, 로컬서버는 리모트서버 IP Address로 로컬비대칭암호키를 전송하며;The local server sends the local asymmetric cryptographic key to the remote server IP Address; 리모트서버는 로컬비대칭암호키를 수신하여 로컬서버 IP Address로 리모트 대칭암호키를 로컬비대칭암호키로 암호화한 리모트암호키를 로컬서버로 전송하며;The remote server receives the local asymmetric cryptographic key and transmits the remote cryptographic key, which is encrypted with the local asymmetric cryptographic key to the remote symmetric cryptographic key to the local server IP address, to the local server; 로컬서버는 상기 리모트암호키를 로컬대칭암호키로 복호화한 리모트대칭암호키와 로컬메모리에 저장된 리모트대칭암호키가 일치할 경우, 로컬서버와 리모트서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며;When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server Open; 로그아웃(Log-in)시 로컬비대칭암호키, 리모트암호키가 삭제되며;At the time of log-in, the local asymmetric encryption key and the remote encryption key are deleted; 로컬서버가 리모트서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)할 경우,When the local server logs in to the remote server requesting bidirectional tunneling data communication, 리모트서버는 로컬서버 IP Address로 리모트비대칭암호키를 전송하며;The remote server sends the remote asymmetric cryptographic key to the local server IP Address; 로컬서버는 리모트비대칭암호키를 수신하여 리모트서버 IP Address로 로컬 대칭암호키를 리모트비대칭암호키로 암호화한 로컬암호키를 리모트서버로 전송하며;The local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server; 리모트서버는 상기 로컬암호키를 리모트대칭암호키로 복호화한 로컬대칭암호키와 리모트메모리에 저장된 로컬대칭암호키가 일치할 경우, 리모트서버와 로컬서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며;When the local symmetric encryption key decrypted with the remote symmetric encryption key is identical to the local symmetric encryption key stored in the remote memory, the remote server performs a log-in bi-directional tunneling data communication between the remote server and the local server Open; 로그아웃(Log-in)시 리모트비대칭암호키, 로컬암호키가 삭제되는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.Wherein the remote asymmetric encryption key and the local encryption key are deleted at the time of log-in. 리모트서버는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 리모트제어부를 포함하여 구성되어,The remote server includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, 상기 리모트난수생성기는 리모트대칭암호키를 생성하며;Wherein the remote random number generator generates a remote symmetric encryption key; 상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터를 생성하여 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성하며; Wherein the remote control unit generates unique remote PIN data using a physical process deviation occurring during a manufacturing process of a remote PUF chip and generates a remote asymmetric encryption key by encrypting the remote symmetric encryption key; 상기 리모트대칭암호키는 로컬서버 내부 로컬메모리에 저장되며;Wherein the remote symmetric encryption key is stored in a local server internal local memory; 로컬서버는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성되어, The local server includes a local PUF chip, a local random number generator, a local memory, and a local controller, 상기 로컬난수생성기는 로컬대칭암호키를 생성하며; The local random number generator generating a local symmetric encryption key; 상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성하며; Wherein the local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key; 상기 로컬대칭암호키는 리모트서버 내부 리모트메모리에 저장되며;The local symmetric encryption key is stored in a remote server internal remote memory; 리모트서버가 로컬서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)하면,When the remote server logs in to the local server requesting bi-directional tunneling data communication, 로컬서버는 리모트서버 IP Address로 로컬비대칭암호키를 전송하며;The local server sends the local asymmetric cryptographic key to the remote server IP Address; 리모트서버는 로컬비대칭암호키를 수신하여 로컬서버 IP Address로 리모트대칭암호키를 로컬비대칭암호키로 암호화한 리모트암호키를 로컬서버로 전송하며;The remote server receives the local asymmetric cryptographic key and transmits the remote cryptographic key, which is encrypted with the local asymmetric cryptographic key to the remote symmetric cryptographic key to the local server IP address, to the local server; 로컬서버는 상기 리모트암호키를 로컬대칭암호키로 복호화한 리모트대칭암호키와 로컬메모리에 저장된 리모트대칭암호키가 일치할 경우, 로컬서버와 리모트서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며;When the remote symmetric encryption key decrypted with the local symmetric encryption key is identical to the remote symmetric encryption key stored in the local memory, the local server performs a log-in bi-directional tunneling data communication between the local server and the remote server Open; 로그아웃(Log-in)시 로컬비대칭암호키, 리모트암호키가 삭제되며;At the time of log-in, the local asymmetric encryption key and the remote encryption key are deleted; 로컬서버가 리모트서버로 양방향 터널링 데이터통신 요청 로그인(Log-in)할 경우,When the local server logs in to the remote server requesting bidirectional tunneling data communication, 리모트서버는 로컬서버 IP Address로 리모트비대칭암호키를 전송하며;The remote server sends the remote asymmetric cryptographic key to the local server IP Address; 로컬서버는 리모트비대칭암호키를 수신하여 리모트서버 IP Address로 로컬 대칭암호키를 리모트비대칭암호키로 암호화한 로컬암호키를 리모트서버로 전송하며;The local server receives the remote asymmetric cryptographic key and transmits the local cryptographic key, which is the remote symmetric cryptographic key encrypted with the remote server IP address, to the remote server; 리모트서버는 상기 로컬암호키를 리모트대칭암호키로 복호화한 로컬대칭암호키와 리모트메모리에 저장된 로컬대칭암호가 일치할 경우, 리모트서버와 로컬서버 사이에 로그인(Log-in) 양방향 터널링 데이터통신을 개통하며;When the local symmetric cipher key decrypted with the remote symmetric encryption key is identical to the local symmetric encryption key stored in the remote memory, the remote server opens the log-in bi-directional tunneling data communication between the remote server and the local server ; 로그아웃(Log-in)시 리모트비대칭암호키, 로컬암호키가 삭제되는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.Wherein the remote asymmetric encryption key and the local encryption key are deleted at the time of log-in. 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어,The secure terminal comprises a quantum random number generator and a PUF PIN data generator, 양자난수생성기는 난수소스발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성되고, 상기 양자검출 다이오드는 양자입자를 방출하는 난수소스발생기로부터 발생하는 양자입자를 검출하고, 상기 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 상기 양자난수 제어부는 상기 양자랜덤펄스 생성기를 통해 발생하는 무작위 난수소스로 양자난수를 생성하여 대칭암호키를 생성하는 마이크로프로세서로 구성되고,Wherein the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit, wherein the quantum detection diode detects quantum particles generated from a random number source generator emitting quantum particles, Generator generates a random pulse corresponding to the detection of the quantum particle by detecting a quantum particle event from the quantum detection diode, and the quantum random number control unit generates a quantum random number by a random random number source generated through the quantum random pulse generator, And a microprocessor for generating an encryption key, PUF PIN 데이터 생성기는 PUF Chip 및 주제어부로 구성되어,The PUF PIN data generator consists of a PUF chip and a main controller, 주제어부는 PUF Chip의 PIN 데이터로 상기 양자난수생성기에서 생성한 대칭암호키를 암호화하여 비대칭암호키를 암호화 생성하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.Wherein the main controller encrypts the asymmetric cryptographic key by encrypting the symmetric cryptographic key generated by the quantum random number generator with the PIN data of the PUF chip. 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어,The secure terminal comprises a quantum random number generator and a PUF PIN data generator, PUF PIN 데이터 생성기는 PUF Chip 및 주제어부로 구성되어, 상기 주제어부는 PUF Chip의 PIN 데이터로 대칭암호키를 생성하며;The PUF PIN data generator comprises a PUF chip and a main control unit, and the main control unit generates a symmetric encryption key using PIN data of the PUF chip; 양자난수생성기는 난수소스발생기, 양자검출 다이오드, 양자랜덤펄스 생성기, 양자난수 제어부로 구성되고, 상기 양자검출 다이오드는 양자입자를 방출하는 난수소스발생기로부터 발생하는 양자입자를 검출하고, 상기 양자랜덤펄스 생성기는 상기 양자검출 다이오드로부터 양자입자 이벤트를 검출하여 양자입자의 검출에 상응하는 랜덤펄스를 발생하고, 상기 양자난수 제어부는 상기 양자랜덤펄스 생성기를 통해 발생하는 무작위 난수소스로 양자난수를 생성하며;Wherein the quantum random number generator comprises a random number generator, a quantum detection diode, a quantum random pulse generator, and a quantum random number control unit, wherein the quantum detection diode detects quantum particles generated from a random number source generator emitting quantum particles, The generator generates a random pulse corresponding to the detection of the quantum particle by detecting a quantum particle event from the quantum detection diode, and the quantum random number control unit generates a quantum random number with a random random number source generated through the quantum random pulse generator; 양자난수 제어부는 상기 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 암호화 생성하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.Wherein the quantum random number control unit encrypts the symmetric cryptographic key with the quantum random number to generate an asymmetric cryptographic key. 리모트 USB는 리모트 PUF Chip, 리모트난수생성기, 리모트메모리, 리모트제어부를 포함하여 구성되어,The remote USB includes a remote PUF chip, a remote random number generator, a remote memory, and a remote control unit, 상기 리모트제어부는 리모트 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 리모트 PIN 데이터로 리모트대칭암호키를 생성하며;Wherein the remote control unit generates a remote symmetric encryption key using unique remote PIN data using a physical process variation occurring during the manufacturing process of the remote PUF chip; 상기 리모트제어부는 상기 리모트난수생성기를 통해 무작위 난수를 발생하여, 상기 리모트대칭암호키를 암호화하여 리모트비대칭암호키를 생성하며; The remote control unit generates a random random number through the remote random number generator and encrypts the remote symmetric encryption key to generate a remote asymmetric encryption key; 상기 리모트대칭암호키는 운영서버 및 로컬 USB 내부 로컬메모리에 저장되며;Wherein the remote symmetric encryption key is stored in an operating server and a local USB internal local memory; 로컬 USB는 로컬 PUF Chip, 로컬난수생성기, 로컬메모리, 로컬제어부를 포함하여 구성되어, The local USB comprises a local PUF chip, a local random number generator, a local memory, and a local controller, 상기 로컬제어부는 로컬 PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 고유의 로컬 PIN 데이터를 생성하여 로컬대칭암호키를 생성하며;The local control unit generates unique local PIN data using a physical process variation occurring during the manufacturing process of the local PUF chip to generate a local symmetric encryption key; 상기 로컬제어부는 상기 로컬양자난수생성기를 통해 무작위 난수를 발생하여, 상기 로컬대칭암호키를 암호화하여 로컬비대칭암호키를 생성하며; The local control unit generates a random random number through the local quantum random number generator to generate a local asymmetric cryptographic key by encrypting the local symmetric cryptographic key; 상기 로컬대칭암호키는 운영서버 및 리모트 USB 내부 리모트메모리에 저장되며;Wherein the local symmetric encryption key is stored in an operating server and a remote USB internal remote memory; 운영서버는 네트워크망에 연결된 리모트 USB 및 로컬 USB로부터 로컬비대칭암호키 및 리모트비대칭암호키를 수신하면, 로컬대칭암호키 및 리모트대칭암호키로 복호화하여 리모트 PIN 데이터 및 로컬 PIN 데이터 사이에 서로 사용자 인증된 PIN 데이터일 경우, When the operation server receives the local asymmetric encryption key and the remote asymmetric encryption key from the remote USB and local USB connected to the network, it decrypts the local symmetric encryption key and the remote symmetric encryption key, In the case of PIN data, 리모트 USB로 로컬 USB의 접속 IP Address를 전송 및 로컬 USB로 리모트 USB의 접속 IP Address를 전송하여 로컬비대칭암호키 및 리모트비대칭암호키를 통해 양방향 통신하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기 시스템.Directional communication through a local asymmetric cryptographic key and a remote asymmetric cryptographic key by transmitting the connection IP address of the local USB with the remote USB and transmitting the connection IP address of the remote USB with the local USB. . 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어,The secure terminal comprises a quantum random number generator and a PUF PIN data generator, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 대칭암호키를 생성하고,The PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip, 양자난수생성기는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기.Wherein the quantum random number generator generates the asymmetric cryptographic key by encrypting the symmetric cryptographic key with a quantum random number. 보안단말기는 양자난수생성기 및 PUF PIN 데이터 생성기로 구성되어,The secure terminal comprises a quantum random number generator and a PUF PIN data generator, 양자난수생성기는 양자난수로 대칭암호키를 생성하고,A quantum random number generator generates a symmetric cryptographic key with a quantum random number, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 하는 PUF-QRNG 양자암호 보안단말기.Wherein the PUF PIN data generator generates the asymmetric encryption key by encrypting the symmetric encryption key with the PIN data of the PUF chip. 보안단말기는 순수난수생성기(TRNG) 및 PUF PIN 데이터 생성기로 구성되어,The secure terminal comprises a pure random number generator (TRNG) and a PUF PIN data generator, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 대칭암호키를 생성하고,The PUF PIN data generator generates a symmetric encryption key using the PIN data of the PUF chip, 순수난수생성기는 순수난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 하는 보안단말기.Wherein the pure random number generator encrypts the symmetric cryptographic key with a pure random number to generate an asymmetric cryptographic key. 보안단말기는 순수난수생성기(TRNG) 및 PUF PIN 데이터 생성기로 구성되어,The secure terminal comprises a pure random number generator (TRNG) and a PUF PIN data generator, 순수난수생성기는 순수난수로 대칭암호키를 생성하고,A pure random number generator generates a symmetric cryptographic key with a pure random number, PUF PIN 데이터 생성기는 PUF Chip의 PIN 데이터로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하는 것을 특징으로 하는 보안단말기.Wherein the PUF PIN data generator generates the asymmetric encryption key by encrypting the symmetric encryption key with the PIN data of the PUF chip. PUF Chip은 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭암호키를 생성하며;PUF Chip generates PIN data using physical process variation occurring during manufacturing process to generate symmetric encryption key; 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며;Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; 상기 비대칭암호키에 양자난수생성기 또는 의사난수발생기를 통해 발생하는 난수로 제1 비대칭암호키 내지 제n 비대칭암호키를 생성하는 것을 특징으로 하는 PUF-QRNG을 통한 암호키 생성 방법.Wherein the first asymmetric cryptographic key to the n-th asymmetric cryptographic key are generated by a random number generated through a quantum random number generator or a pseudo random number generator in the asymmetric cryptographic key. PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭암호키를 생성하며;Generating PIN data using a physical process variation occurring in the manufacturing process of the PUF chip to generate a symmetric encryption key; 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며;Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; 상기 비대칭암호키에 양자난수생성기 또는 의사난수생성기 중 어느 하나를 통해 다시 비대칭암호키를 생성하되,Generating an asymmetric cryptographic key through the quantum random number generator or the pseudo random number generator in the asymmetric cryptographic key, 의사난수생성기를 통해 생성되는 비대칭암호키는 난수발생 해시함수를 새로 생성되는 비대칭암호키에 포함하여 저장되는 것을 특징으로 하는 PUF-QRNG을 통한 암호키 생성 방법.Wherein the asymmetric cryptographic key generated by the pseudo-random number generator is stored by including the random number generating hash function in a newly generated asymmetric cryptographic key. PUF Chip의 제조공정 중 발생하는 물리적 공정편차를 이용해 PIN 데이터를 생성하여 대칭암호키를 생성하며;Generating PIN data using a physical process variation occurring in the manufacturing process of the PUF chip to generate a symmetric encryption key; 양자난수생성기를 통해 발생하는 양자난수로 상기 대칭암호키를 암호화하여 비대칭암호키를 생성하며;Encrypting the symmetric cryptographic key with a quantum random number generated through a quantum random number generator to generate an asymmetric cryptographic key; 의사난수생성기는 난수발생 해시함수로 의사난수를 발생하여 새로운 의사난수를 생성한 후 상기 비대칭암호키를 암호화하여 새로운 비대칭암호키를 생성하되,The pseudo random number generator generates a new pseudo random number by generating a pseudo random number as a random number generating hash function, and then encrypts the asymmetric cryptographic key to generate a new asymmetric cryptographic key, 의사난수생성기를 통해 생성되는 새로운 비대칭암호키는 난수발생 해시함수를 새로 생성되는 비대칭암호키에 포함하여 저장되는 것을 특징으로 하는 PUF-QRNG을 통한 암호키 생성 방법.Wherein the new asymmetric cryptographic key generated by the pseudo-random number generator is stored by including the random number generated hash function in a newly generated asymmetric cryptographic key.
PCT/KR2018/013095 2017-10-31 2018-10-31 Puf-qrng quantum cryptographic security terminal system and cryptographic key generation method Ceased WO2019088689A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020170142982A KR101888629B1 (en) 2017-10-31 2017-10-31 The PUF-QRNG security terminal system
KR10-2017-0142982 2017-10-31

Publications (1)

Publication Number Publication Date
WO2019088689A1 true WO2019088689A1 (en) 2019-05-09

Family

ID=63719719

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2018/013095 Ceased WO2019088689A1 (en) 2017-10-31 2018-10-31 Puf-qrng quantum cryptographic security terminal system and cryptographic key generation method

Country Status (2)

Country Link
KR (1) KR101888629B1 (en)
WO (1) WO2019088689A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134688A (en) * 2020-09-22 2020-12-25 广东海洋大学 An Asymmetric Image Encryption Method Based on Quantum Chaos Map and SHA-3
CN112398894A (en) * 2019-08-19 2021-02-23 广州汽车集团股份有限公司 Safety verification method and device for vehicle
CN112528257A (en) * 2020-12-04 2021-03-19 百度在线网络技术(北京)有限公司 Security debugging method and device, electronic equipment and storage medium
CN113114474A (en) * 2021-04-17 2021-07-13 中科启迪光电子科技(广州)有限公司 Quantum time-frequency password generation and identification method based on chip atomic clock
WO2021226596A1 (en) * 2020-05-08 2021-11-11 Wane Brian Using keyboard app to encrypt e-mail and other digital data
CN113950049A (en) * 2021-09-28 2022-01-18 天翼物联科技有限公司 Internet of things quantum security method, system, device and medium based on SIM card
US11245519B1 (en) * 2019-10-04 2022-02-08 Wells Fargo Bank, N.A. Systems and methods for quantum entanglement random number generation
CN114124370A (en) * 2021-10-14 2022-03-01 阿里云计算有限公司 Key generation method and device
US20220246538A1 (en) * 2018-12-26 2022-08-04 Sony Semiconductor Solutions Corporation Circuit board, semiconductor apparatus, and electronic equipment
CN119767297A (en) * 2024-10-30 2025-04-04 本源量子计算科技(合肥)股份有限公司 Data processing method and related device

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102054256B1 (en) * 2019-01-11 2019-12-10 주식회사 에너닷 Ami device, integrity verification system and method thereof
KR102239683B1 (en) * 2019-10-23 2021-04-13 주식회사 에너닷 Ami device, integrity verification system and method thereof
CN118842648B (en) * 2024-08-30 2025-07-11 易迅通科技有限公司 Quantum Fusion 5G Encryption Method for IoT Terminals

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090262926A1 (en) * 2008-04-16 2009-10-22 Infineon Technologies Ag Method and apparatus for generating a cryptographic key
KR101495448B1 (en) * 2013-10-29 2015-02-26 (주) 아이씨티케이 Integrated circuit chip for user authentication and autentication method
WO2015056236A1 (en) * 2013-10-17 2015-04-23 Andre Keith Joubert A method of generating key arrays of random numbers and encryption
KR20160091108A (en) * 2015-01-23 2016-08-02 서울시립대학교 산학협력단 Secure payment and authentification system having enhanced security with quantum crypyography
KR101767067B1 (en) * 2014-12-09 2017-08-11 한국과학기술원 Method and system for improving security of quantum encryption key distribution protocol

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090262926A1 (en) * 2008-04-16 2009-10-22 Infineon Technologies Ag Method and apparatus for generating a cryptographic key
WO2015056236A1 (en) * 2013-10-17 2015-04-23 Andre Keith Joubert A method of generating key arrays of random numbers and encryption
KR101495448B1 (en) * 2013-10-29 2015-02-26 (주) 아이씨티케이 Integrated circuit chip for user authentication and autentication method
KR101767067B1 (en) * 2014-12-09 2017-08-11 한국과학기술원 Method and system for improving security of quantum encryption key distribution protocol
KR20160091108A (en) * 2015-01-23 2016-08-02 서울시립대학교 산학협력단 Secure payment and authentification system having enhanced security with quantum crypyography

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220246538A1 (en) * 2018-12-26 2022-08-04 Sony Semiconductor Solutions Corporation Circuit board, semiconductor apparatus, and electronic equipment
CN112398894A (en) * 2019-08-19 2021-02-23 广州汽车集团股份有限公司 Safety verification method and device for vehicle
CN112398894B (en) * 2019-08-19 2022-05-24 广州汽车集团股份有限公司 Vehicle safety verification method and device
US11245519B1 (en) * 2019-10-04 2022-02-08 Wells Fargo Bank, N.A. Systems and methods for quantum entanglement random number generation
US12010224B2 (en) 2019-10-04 2024-06-11 Wells Fargo Bank, N.A. Systems and methods for quantum entanglement random number generation
WO2021226596A1 (en) * 2020-05-08 2021-11-11 Wane Brian Using keyboard app to encrypt e-mail and other digital data
US11563725B2 (en) 2020-05-08 2023-01-24 Brian Wane Using keyboard app to encrypt e-mail and other digital data
US20230164126A1 (en) * 2020-05-08 2023-05-25 Brian Wane Encrypting E-mail and Other Digital Data Using Quantum Random Number Generator
US12120098B2 (en) 2020-05-08 2024-10-15 Xq Message Inc. Encrypting e-mail and other digital data using quantum random number generator
CN112134688A (en) * 2020-09-22 2020-12-25 广东海洋大学 An Asymmetric Image Encryption Method Based on Quantum Chaos Map and SHA-3
CN112134688B (en) * 2020-09-22 2023-10-31 广东海洋大学 An asymmetric image encryption method based on quantum chaos mapping and SHA-3
CN112528257B (en) * 2020-12-04 2023-08-01 百度在线网络技术(北京)有限公司 Secure debugging method and device, electronic equipment and storage medium
CN112528257A (en) * 2020-12-04 2021-03-19 百度在线网络技术(北京)有限公司 Security debugging method and device, electronic equipment and storage medium
CN113114474A (en) * 2021-04-17 2021-07-13 中科启迪光电子科技(广州)有限公司 Quantum time-frequency password generation and identification method based on chip atomic clock
CN113950049A (en) * 2021-09-28 2022-01-18 天翼物联科技有限公司 Internet of things quantum security method, system, device and medium based on SIM card
CN113950049B (en) * 2021-09-28 2023-10-03 天翼物联科技有限公司 Quantum security method, system, device and medium of Internet of things based on SIM card
CN114124370A (en) * 2021-10-14 2022-03-01 阿里云计算有限公司 Key generation method and device
CN119767297A (en) * 2024-10-30 2025-04-04 本源量子计算科技(合肥)股份有限公司 Data processing method and related device

Also Published As

Publication number Publication date
KR101888629B1 (en) 2018-09-20

Similar Documents

Publication Publication Date Title
WO2019088689A1 (en) Puf-qrng quantum cryptographic security terminal system and cryptographic key generation method
WO2013025060A2 (en) Device and method for puf-based inter-device security authentication in machine-to-machine communication
WO2014069783A1 (en) Password-based authentication method, and apparatus for performing same
WO2021095998A1 (en) A trusted computing method and system
WO2018151390A1 (en) Internet of things device
WO2014030911A1 (en) Apparatus and method for processing authentication information
WO2023163509A1 (en) System for controlling controller-based network connection and method related to same
WO2013048111A2 (en) Method and apparatus for detecting an intrusion on a cloud computing service
WO2020186775A1 (en) Service data providing method, apparatus and device, and computer-readable storage medium
WO2024177382A1 (en) System for controlling network access and method therefor
WO2020050424A1 (en) BLOCK CHAIN-BASED SYSTEM AND METHOD FOR MULTIPLE SECURITY AUTHENTICATION BETWEEN MOBILE TERMINAL AND IoT DEVICE
KR101993885B1 (en) The PUF-QRANG quantum system with security chips
WO2013086758A1 (en) Ethernet encryption and authentication system and method
WO2015012667A1 (en) Device and method for testing randomness
WO2020235733A1 (en) Device and method for authenticating user and obtaining user signature using user's biometrics
WO2023146308A1 (en) System for controlling network access on basis of controller, and method therefor
WO2019132270A1 (en) Secure communication method in nfv environment and system therefor
KR20190049006A (en) The PUF-QRNG remote meter reader
WO2023163514A1 (en) Controller-based network access control system and method therefor
WO2020067734A1 (en) Non-address network equipment and communication security system using same
WO2023211104A1 (en) System for controlling controller-based network access, and method related thereto
WO2018199637A1 (en) Quantum security authentication system
WO2020096180A1 (en) Method for confirming indication of intent which is capable of ensuring anonymity and preventing sybil attacks, and method for registering and authenticating identification information storage module
WO2020122368A1 (en) System and method for securing and managing data in storage device by using secure terminal
KR20190102960A (en) The PUF-QRANG quantum security system and the way to do anti-crime CCTV-QRNG communication and its panel

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18874658

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18874658

Country of ref document: EP

Kind code of ref document: A1